Author of the publication

Context-Aware Defenses to RFID Unauthorized Reading and Relay Attacks.

, , , , , and . IEEE Trans. Emerg. Top. Comput., 1 (2): 307-318 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009), and . CoRR, (2009)Lost in Translation: Improving Decoy Documents via Automated Translation., , and . IEEE Symposium on Security and Privacy Workshops, page 129-133. IEEE Computer Society, (2012)Data remanence effects on memory-based entropy collection for RFID systems., and . Int. J. Inf. Sec., 10 (4): 213-222 (2011)Still and Silent: Motion Detection for Enhanced RFID Security and Privacy without Changing the Usage Model., and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 2-21. Springer, (2010)Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing, , and . CoRR, (2010)Fox in the trap: thwarting masqueraders via automated decoy document deployment., , , and . EUROSEC, page 3:1-3:7. ACM, (2015)Can mobile device users be identified by how they play a game?, and . Sarnoff Symposium, page 1-2. IEEE, (2016)Active authentication using file system decoys and user behavior modeling: results of a large scale study., , , , and . Comput. Secur., (2019)Sensing-enabled defenses to RFID unauthorized reading and relay attacks without changing the usage model., , , , , , and . PerCom, page 227-234. IEEE Computer Society, (2012)Pairing Devices with Good Quality Output Interfaces., and . ICDCS Workshops, page 382-387. IEEE Computer Society, (2008)