Author of the publication

Gesture Authentication with Touch Input for Mobile Devices.

, and . MobiSec, volume 94 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 13-24. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iPhish: Phishing Vulnerabilities on Consumer Electronics., , and . UPSEC, USENIX Association, (2008)Five Years of the Right to be Forgotten., , , , , , , , , and 10 other author(s). ACM Conference on Computer and Communications Security, page 959-972. ACM, (2019)Message Passing Algorithm for GFDM-IM Detection., and . DSP, page 1-5. IEEE, (2018)Bridging Gaps in Organizational Knowledge - The Role of IT-Enabled Organizational Learning in Supply Chain Partnerships., , , and . ICIS, page 74. Association for Information Systems, (2009)Research on PCB Defect Detection Algorithm Based on Improved YOLOv5., , and . RICAI, page 1220-1224. ACM, (2022)A Quantitative Study of Forum Spamming Using Context-based Analysis., , , , and . NDSS, The Internet Society, (2007)Spam double-funnel: connecting web spammers with advertisers., , , and . WWW, page 291-300. ACM, (2007)Gesture Authentication with Touch Input for Mobile Devices., and . MobiSec, volume 94 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 13-24. Springer, (2011)Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension., , , , , , , and . WWW, page 1009-1019. ACM, (2016)Implicit Authentication through Learning User Behavior., , , and . ISC, volume 6531 of Lecture Notes in Computer Science, page 99-113. Springer, (2010)