Author of the publication

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.

, , , , , and . AsiaCCS, page 75-87. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices., , , and . J. Internet Serv. Inf. Secur., 7 (4): 35-44 (2017)Combating online fraud attacks in mobile-based advertising., , , , and . EURASIP J. Information Security, (2016)Keyboard or keylogger?: A security analysis of third-party keyboards on Android., , and . PST, page 173-176. IEEE Computer Society, (2015)An Empirical Study of Click Fraud in Mobile Advertising Networks., , , and . ARES, page 382-388. IEEE Computer Society, (2015)On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?, , , , , , , and . ACM Trans. Priv. Secur., 23 (4): 22:1-22:32 (2020)Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 663-677. Springer, (2017)SysPal: System-Guided Pattern Locks for Android., , , , , and . IEEE Symposium on Security and Privacy, page 338-356. IEEE Computer Society, (2017)User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies., , and . IEEE Consumer Electronics Magazine, 7 (3): 48-55 (2018)Design and Analysis of Push Notification-Based Malware on Android., , , and . Secur. Commun. Networks, (2018)ACIDroid: a practical app cache integrity protection system on Android Runtime., , , , , and . SAC, page 376-383. ACM, (2020)