Author of the publication

Interactive Shopping Experience through Immersive Store Environments.

, , , , , and . HCI (11), volume 8014 of Lecture Notes in Computer Science, page 372-382. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reputation-Based Security System For Edge Computing., , and . ARES, page 39:1-39:8. ACM, (2018)Skynet: a Cyber-Aware Intrusion Tolerant Overseer., , , and . DSN-S, page 111-116. IEEE, (2023)Towards a Modular On-Premise Approach for Data Sharing., , , , and . Sensors, 21 (17): 5805 (2021)Using Edge-Clouds to Reduce Load on Traditional WiFi Infrastructures and Improve Quality of Experience., , , , , and . ICFEC, page 61-67. IEEE Computer Society, (2017)Container Hardening Through Automated Seccomp Profiling., , , , and . WOC@Middleware, page 31-36. ACM, (2020)Employment of Secure Enclaves in Cheat Detection Hardening., , and . TrustBus, volume 12395 of Lecture Notes in Computer Science, page 48-62. Springer, (2020)Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication., , , and . Comput. Secur., (June 2023)A Survey on Using Kolmogorov Complexity in Cybersecurity., , and . Entropy, 21 (12): 1196 (2019)Short paper: CHIPS: content-based heuristics for improving photo privacy for smartphones., , , , and . WISEC, page 213-218. ACM, (2014)pTASC: trustable autonomous secure communications., , , , and . ICDCN, page 193-202. ACM, (2019)