Author of the publication

WACA: Wearable-Assisted Continuous Authentication.

, , , and . IEEE Symposium on Security and Privacy Workshops, page 264-269. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Curie: Policy-based Secure Data Exchange., , , , , and . CoRR, (2017)Energy consumption of on-device machine learning models for IoT intrusion detection., , , , and . Internet Things, (April 2023)Peek-a-boo: i see your smart home activities, even encrypted!, , , , , , , , and . WISEC, page 207-218. ACM, (2020)The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments., , , and . NDSS, The Internet Society, (2022)(In)Security of File Uploads in Node.js., , , , , and . WWW, page 1573-1584. ACM, (2024)IoTDots: A Digital Forensics Framework for Smart Environments., , , and . CoRR, (2018)A digital forensics framework for smart settings: poster., , , and . WiSec, page 332-333. ACM, (2019)A Survey on Decentralized Identifiers and Verifiable Credentials., , , , , and . CoRR, (2024)A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA., , , , , , and . ACM Trans. Priv. Secur., 24 (4): 24:1-24:28 (2021)Exploring Jamming and Hijacking Attacks for Micro Aerial Drones., , , , , , and . CoRR, (2024)