Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"I... caught a person casing my house... and scared him off: " The Use of Security-Focused Smart Home Devices by People with Disabilities., , , , and . CHI, page 846:1-846:16. ACM, (2023)Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed., , , , , and . DCOSS, volume 3560 of Lecture Notes in Computer Science, page 406-407. Springer, (2005)Proximity Based Access Control in Smart-Emergency Departments., , , and . PerCom Workshops, page 512-516. IEEE Computer Society, (2006)Challenges of implementing cyber-physical security solutions in body area networks., , and . BODYNETS, page 18. ICST, (2009)Criticality Aware Access Control Model for Pervasive Applications., , and . PerCom, page 251-257. IEEE Computer Society, (2006)Short paper: Establishing trust in a vehicular network., and . VNC, page 194-197. IEEE, (2013)BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body., , and . ICPP Workshops, page 432-. IEEE Computer Society, (2003)Detecting malicious morphological alterations of ECG signals in body sensor networks., and . IPSN, page 342-343. ACM, (2015)"Sometimes I feel that I'm being left behind": Exploring Computing Device Use by People with Upper Extremity Impairment During the COVID-19 Pandemic., , and . CHI Extended Abstracts, page 390:1-390:9. ACM, (2022)Exploring the Requirements of Abuse Reporting for Persons with Intellectual and Developmental Disabilities., , , , and . ASSETS, page 66:1-66:4. ACM, (2021)