Author of the publication

Inferring User Height and Improving Impersonation Attacks in Mobile Payments using a Smartwatch.

, , , and . PerCom Workshops, page 775-780. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol, , and . Communications Surveys Tutorials, IEEE, (2014)Demo: End-to-End Wireless Disruption of CCS EV Charging., , , and . CCS, page 3515-3517. ACM, (2022)Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets., , , and . CODASPY, page 61-72. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments., , , and . SECRYPT, page 135-146. SCITEPRESS, (2023)Seeing Red: PPG Biometrics Using Smartphone Cameras., , , and . CVPR Workshops, page 3565-3574. Computer Vision Foundation / IEEE, (2020)Peeves: Physical Event Verification in Smart Homes., , and . CCS, page 1455-1467. ACM, (2019)BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior., , , , and . AsiaCCS, page 652-664. ACM, (2020)Secrets in the sky: on privacy and infrastructure security in DVB-S satellite broadband., , , and . WiSec, page 277-284. ACM, (2019)Safety vs. Security: Attacking Avionic Systems with Humans in the Loop., , , , and . CoRR, (2019)QPEP: A QUIC-Based Approach to Encrypted Performance Enhancing Proxies for High-Latency Satellite Broadband., , , and . CoRR, (2020)