Biblio
Book Chapter, New Challenges for User Privacy in Cyberspace
, in: Human Computer Interaction and Cybersecurity. Handbook
, CRC Press - Taylor and Francis, Boca Raton, USA, 2019, pp. 77-98, ISBN 9781138739161, PM: 20.
Journal Article, Model for Adaptable Context-Based Biometric Authentication for Mobile Devices
, in: Personal and Ubiquitous Computing, vol. 20, issue 2
, Springer, 2016, pp. 195-207, DOI 10.1007/s00779-016-0905-0, IF: 2.395, PM: 30.
Abstract
Pobierz: 10.1007_s00779-016-0905-0.pdf (1.21 MB)
Journal Article, Computer Simulation of Prostate Cryoablation - Fast and Accurate Approximation of the Exact Solution
, in: Computer Aided Surgery, vol. 8, issue 2
, Taylor & Francis, 11/2003, pp. 91-97, DOI http://dx.doi.org/10.3109/10929080309146043, IF: 1.49, PM: 25.
Journal Article, Architecture for Adaptable Smart Spaces Oriented on User Privacy
, in: Logic Journal of the IGPL, vol. 25, issue 1
, Oxford University Press, 2017, pp. 3-17, DOI 10.1093/jigpal/jzw039, IF: 0.449, PM: 30.
Abstract
Conference Paper, Web Platform with Role-based Security for Decentralized Creation of Web 2.0 Learning Content
, in: Proceedings of the 7th International Conference on Next Generation Web Services Practices (NWeSP), 19–21 October 2011, Salamanca, Spain
, IEEE, 2011, pp. 523-529, ISBN 9781457711251, DOI 10.1109/nwesp.2011.6088234, PM: 5.
Book Chapter, Payment Authorization in Smart Environments: Security-Convenience Balance
, in: Enterprise Information Systems. Lecture Notes in Business Information Processing, vol. 363
, Springer, 2019, pp. 58-81, ISBN 978-3-030-26168-9, DOI 10.1007/978-3-030-26169-6_4, PM: 20.
Journal Article, Securing Ubiquitous AR Services
, in: Multimedia Tools and Applications, vol. 77, issue 20
, Springer, 2018, pp. 26881–26899, DOI 10.1007/s11042-018-5892-x, IF: 1.541, PM: 30.
Abstract
Book Chapter, Access Control Model for Dynamic VR Applications
, in: Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management
, IGI Global, 2011, pp. 284-305, ISBN 9781615208913 , DOI 10.4018/978-1-61520-891-3.ch013, PM: 5.
Conference Paper, Security Model for Large Scale Content Distribution Applied to Federated Virtual Environments
, in: Lecture Notes in Business Information Processing
, Conference on Advanced Information Systems Engineering Workshops: CAiSE 2013 International Workshops, Valencia (Spain), June 17 -21, 2013, Springer Verlag, Heidelberg, 2013, pp. 502--511, ISBN 978-3-642-38489-9, DOI 10.1007/978-3-642-38490-5_45, PM: 15.
Conference Paper, Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control – Computational Evaluation
, Computational Intelligence in Security for Information Systems (CISIS), Springer, 2014, pp. 423-432, ISBN 978-3-319-07994-3, DOI 10.1007/978-3-319-07995-0_42, PM: 15.