[ Publications with no year ]

Articles in journals or book chapters (18)
  1. . [bibtex-entry]


  2. . [bibtex-entry]


  3. . [bibtex-entry]


  4. . [bibtex-entry]


  5. . [bibtex-entry]


  6. . [bibtex-entry]


  7. . [bibtex-entry]


  8. . [bibtex-entry]


  9. . [bibtex-entry]


  10. . [bibtex-entry]


  11. . [bibtex-entry]


  12. . [bibtex-entry]


  13. . [bibtex-entry]


  14. Mental Models of Privacy and Security. . [bibtex-entry]


  15. . [bibtex-entry]


  16. . [bibtex-entry]


  17. . [bibtex-entry]


  18. . [bibtex-entry]


Conference articles (2)
  1. In , . [bibtex-entry]


  2. In , . [bibtex-entry]


Internal reports (1)
  1. Technical report, . [bibtex-entry]


Posters and Presentations (2)
  1. [bibtex-entry]


  2. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Fri Jul 26 17:58:25 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House