Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SLASS: Secure Login against Shoulder Surfing., and . SNDS, volume 420 of Communications in Computer and Information Science, page 346-357. Springer, (2014)Towards incorporating honeywords in n-session recording attack resilient unaided authentication services., and . IET Inf. Secur., 13 (1): 7-18 (2019)The Tale of Sansa Spark., , , , , , , , , and 2 other author(s). ISWC (Posters, Demos & Industry Tracks), volume 1963 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective., , and . ICDH, page 1-12. IEEE, (2023)Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit., and . CoRR, (2017)The Tale of Sansa Spark, , , , , , , , , and 2 other author(s). Proceedings of 16th International Semantic Web Conference, Poster & Demos, (2017)Tag Digit Based Honeypot to Detect Shoulder Surfing Attack., and . SSCC, volume 467 of Communications in Computer and Information Science, page 101-110. Springer, (2014)Few notes towards making honeyword system more secure and usable., and . SIN, page 237-245. ACM, (2015)Learning to Rank Query Graphs for Complex Question Answering over Knowledge Graphs., , , , , and . CoRR, (2018)On designing a modified-UI based honeyword generation approach for overcoming the existing limitations., and . Comput. Secur., (2017)