Author of the publication

Zensei: Embedded, Multi-electrode Bioimpedance Sensing for Implicit, Ubiquitous User Recognition.

, , , , , , , and . CHI, page 3972-3985. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trusted P2P computing environments with role-based access control., , and . IET Inf. Secur., 1 (1): 27-35 (2007)Dynamic Taint Propagation for Java., , and . ACSAC, page 303-311. IEEE Computer Society, (2005)A portable Virtual Machine target for Proof-Carrying Code., , , , , and . IVME, page 24-31. ACM, (2003)Google's Auction for TV Ads., , , , , , , , , and 1 other author(s). ICALP (2), volume 5556 of Lecture Notes in Computer Science, page 309-327. Springer, (2009)Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges., , , and . IEEE Signal Process. Mag., 33 (4): 49-61 (2016)Awarded Best Paper! Semantic Remote Attestation - Virtual Machine Directed Approach to Trusted Computing., , and . Virtual Machine Research and Technology Symposium, page 29-41. USENIX, (2004)Demo hour., , , , , , , , , and 19 other author(s). Interactions, 23 (2): 8-11 (2016)Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine., and . ACSAC, page 463-475. IEEE Computer Society, (2007)Partial face detection for continuous authentication., , , , and . ICIP, page 2991-2995. IEEE, (2016)Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data., , , , and . ICB, page 135-142. IEEE, (2015)