Author of the publication

UACAP: A Unified Auxiliary Channel Authentication Protocol.

, , and . IEEE Trans. Mob. Comput., 12 (4): 710-721 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Java-based Data Caching for Mobile Information System Clients., , , and . MMS, volume P-104 of LNI, page 97-101. GI, (2007)"...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices., , and . SOUPS, page 327-346. USENIX Association, (2015)"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking., , , and . CHI, page 2657-2666. ACM, (2014)Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices., , and . ACSAC, page 233-242. IEEE Computer Society, (2007)Home is safer than the cloud!: privacy concerns for consumer cloud storage., , , and . SOUPS, page 13. ACM, (2011)Influence of user perception, security needs, and social factors on device pairing method choices., , , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)User-Centered Security Mechanisms for Protecting Information Sharing in the Cloud.. ETH Zurich, Zürich, Switzerland, (2012)base-search.net (ftethz:oai:www.research-collection.ethz.ch:20.500.11850/72755).Access control for home data sharing: evaluating social acceptability., , , , , , , , , and 6 other author(s). CHI, page 645-654. ACM, (2010)Resource Management for Global Public Computing: Many Policies Are Better Than (N)one., , and . WORLDS, USENIX Association, (2006)UACAP: A Unified Auxiliary Channel Authentication Protocol., , and . IEEE Trans. Mob. Comput., 12 (4): 710-721 (2013)