Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SMASheD: Sniffing and Manipulating Android Sensor Data., , and . CODASPY, page 152-159. ACM, (2016)A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability., , , , , , , , and . AsiaCCS, page 195-206. ACM, (2014)Gametrics: towards attack-resilient behavioral authentication with simple cognitive games., and . ACSAC, page 277-288. ACM, (2016)Gaming the game: Defeating a game captcha with efficient and robust hybrid attacks., , , and . ICME, page 1-6. IEEE Computer Society, (2014)Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability., , , , , , , , and . CoRR, (2013)Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise., , and . WISEC, page 67-77. ACM, (2016)SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes., , and . IEEE Trans. Inf. Forensics Secur., 12 (4): 901-913 (2017)ZEMFA: Zero-Effort Multi-Factor Authentication based on Multi-Modal Gait Biometrics., , and . PST, page 1-10. IEEE, (2019)Emerging-Image Motion CAPTCHAs: Vulnerabilities of Existing Designs, and Countermeasures., , , and . IEEE Trans. Dependable Secur. Comput., 16 (6): 1040-1053 (2019)Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks., , , and . ACSAC, page 870-883. ACM, (2020)