Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representation and analysis of coordinated attacks., and . FMSE, page 43-51. ACM, (2003)Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks., , and . CoRR, (2020)On extracting consistent graphs in wireless sensor networks., , , and . Int. J. Sens. Networks, 2 (3/4): 149-162 (2007)A Framework for Inferring Combination Lock Codes using Smartwatches., , , and . CoRR, (2017)Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users., , , , and . CoRR, (2023)On Algorand Transaction Fees: Challenges and Mechanism Design., , , , and . ICC, page 5403-5408. IEEE, (2022)Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain., , and . VCC, page 49-55. IEEE, (2023)Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms., , , and . AsiaCCS, page 795-806. ACM, (2016)Social Puzzles: Context-Based Access Control in Online Social Networks., , and . DSN, page 299-310. IEEE Computer Society, (2014)Towards a Practical Pedestrian Distraction Detection Framework using Wearables., , , , , and . PerCom Workshops, page 239-245. IEEE Computer Society, (2018)