Author of the publication

Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems.

, , , and . AutoSec@CODASPY, page 31-35. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users., , , , and . CoRR, (2023)On extracting consistent graphs in wireless sensor networks., , , and . Int. J. Sens. Networks, 2 (3/4): 149-162 (2007)Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks., , and . CoRR, (2020)Representation and analysis of coordinated attacks., and . FMSE, page 43-51. ACM, (2003)A Framework for Inferring Combination Lock Codes using Smartwatches., , , and . CoRR, (2017)Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain., , and . VCC, page 49-55. IEEE, (2023)On Algorand Transaction Fees: Challenges and Mechanism Design., , , , and . ICC, page 5403-5408. IEEE, (2022)Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms., , , and . AsiaCCS, page 795-806. ACM, (2016)Social Puzzles: Context-Based Access Control in Online Social Networks., , and . DSN, page 299-310. IEEE Computer Society, (2014)Towards a Practical Pedestrian Distraction Detection Framework using Wearables., , , , , and . PerCom Workshops, page 239-245. IEEE Computer Society, (2018)