Author of the publication

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.

, , , , , and . NDSS, The Internet Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques., , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 147-169. Springer, (2022)Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity., , and . CNS, page 1-9. IEEE, (2018)Predicting Misinformation and Engagement in COVID-19 Twitter Discourse in the First Months of the Outbreak., , , , , , , , and . CoRR, (2020)IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables., , and . ACSAC, page 706-716. ACM, (2020)Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise., , and . WISEC, page 67-77. ACM, (2016)Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks., , , , , and . NDSS, The Internet Society, (2016)People Still Care About Facts: Twitter Users Engage More with Factual Discourse than Misinformation., , , , , , , , , and . SocialSec, volume 14097 of Lecture Notes in Computer Science, page 3-22. Springer, (2023)Hacksaw: biometric-free non-stop web authentication in an emerging world of wearables., and . WISEC, page 13-24. ACM, (2020)Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications., , , and . AsiaCCS, page 447-461. ACM, (2021)Listening Watch: Wearable Two-Factor Authentication using Speech Signals Resilient to Near-Far Attacks., and . WISEC, page 99-110. ACM, (2018)