Author of the publication

Sensor use and usefulness: Trade-offs for data-driven authentication on mobile devices.

, , , , and . PerCom, page 189-197. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diffie-Hellman Key Agreement.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)PKI Trust Models.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Everything's Cool: Extending Security Warnings with Thermal Feedback., , and . CHI Extended Abstracts, page 2232-2239. ACM, (2017)Identity Management.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Schnorr Identification Protocol.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Pictures or questions?: examining user responses to association-based authentication., and . BCS HCI, page 98-107. ACM, (2010)Schnorr Indentification Scheme.. Encyclopedia of Cryptography and Security, Springer, (2005)Key agreement.. Encyclopedia of Cryptography and Security, Springer, (2005)Personal Safety App Effectiveness., , , , , , , and . CHI Extended Abstracts, ACM, (2019)The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection., , , and . EICC, page 21-28. ACM, (2022)