Author of the publication

Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes (Extended Technical Report).

, , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Platform-based design for an embedded-fingerprint-authentication device., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 24 (12): 1929-1936 (2005)The FinTech Perspective on Banks: Collaboration, Challenges and Recommendations., , and . PACIS, page 12. (2022)Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes., , , , , and . SP, page 303-320. IEEE, (2022)A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks., , and . ITCC (1), page 538-543. IEEE Computer Society, (2005)HW/SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor., , , and . Integr., 40 (1): 45-51 (2007)A Security Protocol for Biometric Smart Cards., , , and . CARDIS, USENIX, (2002)Energy-Memory-Security Tradeoffs in Distributed Sensor Networks., , and . ADHOC-NOW, volume 3158 of Lecture Notes in Computer Science, page 70-81. Springer, (2004)Reducing radio energy consumption of key management protocols for wireless sensor networks., , , and . ISLPED, page 351-356. ACM, (2004)Low power showdown: comparison of five DSP platforms implementing an LPC speech codec., , and . ICASSP, page 1125-1128. IEEE, (2001)Securing Embedded Systems., , , and . IEEE Secur. Priv., 4 (2): 40-49 (2006)