Author of the publication

Capacitive Touch Communication: A Technique to Input Data through Devices' Touch Screen.

, , , , , , , and . IEEE Trans. Mob. Comput., 13 (1): 4-19 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usability and Security of Trusted Platform Module (TPM) Library APIs., , and . SOUPS @ USENIX Security Symposium, page 213-232. USENIX Association, (2022)From Disorientation to Harmony: Autoethnographic Insights into Transformative Videogame Experiences., , and . CHI, page 808:1-808:20. ACM, (2024)Quantifying the Security of Recognition Passwords: Gestures and Signatures., , , and . CoRR, (2018)Trusting the Search: Unraveling Human Trust in Health Information from Google and ChatGPT., , , , , , and . CoRR, (2024)Auto++: Detecting Cars Using Embedded Microphones in Real-Time., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (3): 70:1-70:20 (2017)Recruit Until It Fails: Exploring Performance Limits for Identification Systems., , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 104:1-104:26 (2019)Systematic Evaluation and User Study of Privacy of Default Apps in Apple's Mobile Ecosystem., and . CoRR, (2022)Leap-of-Faith Security is Enough for IP Mobility., and . CCNC, page 1-5. IEEE, (2009)Distinguishing users with capacitive touch communication., , , , , , , and . MobiCom, page 197-208. ACM, (2012)Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online Games., , and . Proc. ACM Hum. Comput. Interact., 7 (CHI): 1136-1178 (2023)