Author of the publication

Seeing is not believing: visual verifications through liveness analysis using mobile devices.

, , and . ACSAC, page 239-248. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Boundary Tracking Solutions for Mobile Ad Hoc Networks., , and . IASTED PDCS, page 333-338. IASTED/ACTA Press, (2002)Secure Management of Low Power Fitness Trackers., , and . IEEE Trans. Mob. Comput., 15 (2): 447-459 (2016)A Longitudinal Study of Google Play., , and . IEEE Trans. Comput. Social Systems, 4 (3): 135-149 (2017)Uncheatable Reputation for Distributed Computation Markets., and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 96-110. Springer, (2006)Efficient tag detection in RFID systems., , , , and . J. Parallel Distributed Comput., 69 (2): 180-196 (2009)Liveness verifications for citizen journalism videos., , , and . WISEC, page 17:1-17:10. ACM, (2015)JANUS: towards robust and malicious resilient routing in hybrid wireless networks., , and . Workshop on Wireless Security, page 11-20. ACM, (2004)Personal Digital Rights Management for Mobile Cellular Devices., , , and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 246. Springer, (2007)Regulatory Compliant Oblivious RAM., and . ACNS, volume 6123 of Lecture Notes in Computer Science, page 456-474. (2010)JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks., , and . IEEE Trans. Dependable Secur. Comput., 6 (4): 295-308 (2009)