Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities., , , , and . CoRR, (2014)On the Usability of HTTPS Deployment., , , , , and . CHI, page 310. ACM, (2019)Technical perspective - Native Client: a clever alternative.. Commun. ACM, 53 (1): 90 (2010)Rebooting the CS publication process.. Commun. ACM, 54 (10): 32-35 (2011)Practical Robust Localization over Large-Scale 802.11 Wireless Networks, , , , , and . Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM), (2002)Puppeteer: Component-based Adaptation for Mobile Computing, , and . In Proceedings of the 3rd Usenix Symposium on Internet Technologies and Systems, page 159--170. (2000)Robotics-based location sensing using wireless ethernet., , , , , and . MobiCom, page 227-238. ACM, (2002)Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching., , , , and . IEEE Trans. Emerg. Top. Comput., 2 (1): 37-49 (2014)SAFKASI: a security mechanism for language-based systems., , and . ACM Trans. Softw. Eng. Methodol., 9 (4): 341-378 (2000)Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates., , , and . Int. J. Comput. Sci. Educ. Sch., 5 (2): 74-92 (2021)