From post

Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics.

, , , и . ICIAP Workshops, том 9281 из Lecture Notes in Computer Science, стр. 27-34. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proactive Password Checking with Decision Trees., , и . ACM Conference on Computer and Communications Security, стр. 67-77. ACM, (1997)XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, , и . SACMAT, стр. 219-227. ACM, (2006)Issues in Multicast Security., , и . Security Protocols Workshop, том 1796 из Lecture Notes in Computer Science, стр. 119-139. Springer, (1999)A Certification Scheme for Electronic Commerce., и . Security Protocols Workshop, том 1189 из Lecture Notes in Computer Science, стр. 19-32. Springer, (1996)PrivICN: Privacy-preserving content retrieval in information-centric networking., , , и . Comput. Networks, (2019)Efficient integration of fine-grained access control and resource brokering in grid., , , и . J. Supercomput., 49 (1): 108-126 (2009)FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment., , и . IEEE Trans. Inf. Forensics Secur., 8 (6): 1027-1037 (2013)XACML Policy Integration Algorithms., , , и . ACM Trans. Inf. Syst. Secur., 11 (1): 4:1-4:29 (2008)End-to-End Encryption for Securing Communications in Industry 4.0., , и . MENACOMM, стр. 153-158. IEEE, (2022)On the (in)security of Memory Protection Units : A Cautionary Note., , и . CSR, стр. 157-162. IEEE, (2022)