Author of the publication

Location-enhanced authentication using the IoT: because you cannot be in two places at once.

, , , , and . ACSAC, page 251-264. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IoTHound: environment-agnostic device identification and monitoring., , , , , , and . IOT, page 7:1-7:9. ACM, (2020)Location-enhanced authentication using the IoT: because you cannot be in two places at once., , , , and . ACSAC, page 251-264. ACM, (2016)Chameleons' Oblivion: Complex-Valued Deep Neural Networks for Protocol-Agnostic RF Device Fingerprinting., , , and . EuroS&P, page 322-338. IEEE, (2020)Application of Trust Assessment Techniques to IoBT Systems., , , , , , and . MILCOM, page 833-840. IEEE, (2019)Deep Complex Networks for Protocol-Agnostic Radio Frequency Device Fingerprinting in the Wild., , , and . CoRR, (2019)Polytope: Practical Memory Access Control for C++ Applications., , and . CoRR, (2022)Attacking Neural Binary Function Detection., , , , and . CoRR, (2022)Black-box Attacks Against Neural Binary Function Detection., , , , and . RAID, page 1-16. ACM, (2023)Techu: Open and Privacy-Preserving Crowdsourced GPS for the Masses., , and . MobiSys, page 475-487. ACM, (2017)Nibbler: debloating binary shared libraries., , , , and . ACSAC, page 70-83. ACM, (2019)