Author of the publication

The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.

, , , , , and . AsiaCCS, page 75-87. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services., , , and . AsiaCCS, page 352-365. ACM, (2019)POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack., , , , and . ACM Conference on Computer and Communications Security, page 1835-1837. ACM, (2016)On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?, , , , , , , and . ACM Trans. Priv. Secur., 23 (4): 22:1-22:32 (2020)SysPal: System-Guided Pattern Locks for Android., , , , , and . IEEE Symposium on Security and Privacy, page 338-356. IEEE Computer Society, (2017)Threat Modeling and Analysis of Voice Assistant Applications, , , , and . (2019)Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN., , , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 135-152. Springer, (2017)Open Sesame! Design and Implementation of Backdoor to Secretly Unlock Android Devices., , , and . J. Internet Serv. Inf. Secur., 7 (4): 35-44 (2017)On the Effectiveness of Pattern Lock Strength Meters: Measuring the Strength of Real World Pattern Locks., , , , and . CHI, page 2343-2352. ACM, (2015)Combating online fraud attacks in mobile-based advertising., , , , and . EURASIP J. Information Security, (2016)Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks., , , , , , and . Comput. Secur., (2018)