Author of the publication

SLASS: Secure Login against Shoulder Surfing.

, and . SNDS, volume 420 of Communications in Computer and Information Science, page 346-357. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SLASS: Secure Login against Shoulder Surfing., and . SNDS, volume 420 of Communications in Computer and Information Science, page 346-357. Springer, (2014)Towards incorporating honeywords in n-session recording attack resilient unaided authentication services., and . IET Inf. Secur., 13 (1): 7-18 (2019)The Tale of Sansa Spark, , , , , , , , , and 2 other author(s). Proceedings of 16th International Semantic Web Conference, Poster & Demos, (2017)On Overcoming the Identified Limitations of a Usable PIN Entry Method., , , , and . IEEE Access, (2019)On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things., , , , , , , and . IEEE Internet Things J., 8 (5): 3255-3267 (2021)Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit., and . CoRR, (2017)On Understanding the Impact of RTT in the Mobile Network for Detecting the Rogue UAVs., , , , , , and . IEEE Trans. Cogn. Commun. Netw., 6 (4): 1218-1229 (2020)The Tale of Sansa Spark., , , , , , , , , and 2 other author(s). ISWC (Posters, Demos & Industry Tracks), volume 1963 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective., , and . ICDH, page 1-12. IEEE, (2023)RTT-Based Rogue UAV Detection in IoV Networks., , , , , , , and . IEEE Internet Things J., 9 (8): 5909-5919 (2022)