Author of the publication

Exploring A Reporting Tool to Empower Individuals with Intellectual and Developmental Disabilities to Self-Report Abuse.

, , , , , , , , , , and . CHI, page 373:1-373:13. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed., , , , , and . DCOSS, volume 3560 of Lecture Notes in Computer Science, page 406-407. Springer, (2005)"I... caught a person casing my house... and scared him off: " The Use of Security-Focused Smart Home Devices by People with Disabilities., , , , and . CHI, page 846:1-846:16. ACM, (2023)BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body., , and . ICPP Workshops, page 432-. IEEE Computer Society, (2003)Short paper: Establishing trust in a vehicular network., and . VNC, page 194-197. IEEE, (2013)Proximity Based Access Control in Smart-Emergency Departments., , , and . PerCom Workshops, page 512-516. IEEE Computer Society, (2006)Criticality Aware Access Control Model for Pervasive Applications., , and . PerCom, page 251-257. IEEE Computer Society, (2006)Challenges of implementing cyber-physical security solutions in body area networks., , and . BODYNETS, page 18. ICST, (2009)A honeypot system for wearable networks., , , , and . Sarnoff Symposium, page 199-201. IEEE, (2016)Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification., , , and . IEEE Secur. Priv., 10 (6): 70-73 (2012)Challenges and Research Directions in Medical Cyber-Physical Systems., , , , , , , , , and 1 other author(s). Proc. IEEE, 100 (1): 75-90 (2012)