Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptions of Risk in Mobile Transaction., , , and . IEEE Symposium on Security and Privacy Workshops, page 214-223. IEEE Computer Society, (2016)Security challenges for Enterprise Java in an e-business environment., , , , and . IBM Syst. J., 40 (1): 130-152 (2001)Validating structural properties of nested objects., , , , , , and . OOPSLA Companion, page 294-304. ACM, (2004)GROOP: An Object-Oriented Toolkit for Animated 3D Graphics., and . OOPSLA, page 309-325. ACM, (1993)SIGPLAN Notices 28(10) / OOPSLA'93, Addendum to the Proceedings: OOPS Messenger 5(2) April 1994.Access rights analysis for Java., , and . OOPSLA, page 359-372. ACM, (2002)SIGPLAN Notices 37(11).Embedded Menus: Selecting Items in Context., and . Commun. ACM, 29 (4): 312-318 (1986)Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014., , , and . CoRR, (2014)Passive security intelligence to analyze the security risks of mobile/BYOD activities., , , , , , , , , and . IBM J. Res. Dev., 60 (4): 9 (2016)Elements of visual language., and . VL, page 38-44. IEEE Computer Society, (1988)Automatic detection of immutable fields in Java., , , and . CASCON, page 10. IBM, (2000)