Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors., , and . IEEE Trans. Mob. Comput., 15 (5): 1197-1210 (2016)Pairwise Alignment of Protein Interaction Networks., , , , , and . J. Comput. Biol., 13 (2): 182-199 (2006)SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers., , and . ICNP, page 191-196. IEEE Computer Society, (2014)Natural Language Watermarking and Tamperproofing., , , , , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 196-212. Springer, (2002)Inferring functional information from domain co-evolution., , , , and . Bioinform., 22 (1): 40-49 (2006)Enabling Multiple QR Codes in Close Proximity., , , and . CoRR, (2015)Liveness verifications for citizen journalism videos., , , and . WISEC, page 17:1-17:10. ACM, (2015)Secure Management of Low Power Fitness Trackers., , and . IEEE Trans. Mob. Comput., 15 (2): 447-459 (2016)Runtime adaptive multi-factor authentication for mobile devices., , , , , and . IBM J. Res. Dev., (2013)A hierarchical protocol for increasing the stealthiness of steganographic methods., , , , , and . MM&Sec, page 16-24. ACM, (2004)