Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lighting Two Candles With One Flame: An Unaided Human Identification Protocol With Security Beyond Conventional Limit., and . CoRR, (2017)SLASS: Secure Login against Shoulder Surfing., and . SNDS, volume 420 of Communications in Computer and Information Science, page 346-357. Springer, (2014)Towards incorporating honeywords in n-session recording attack resilient unaided authentication services., and . IET Inf. Secur., 13 (1): 7-18 (2019)Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective., , and . ICDH, page 1-12. IEEE, (2023)The Tale of Sansa Spark., , , , , , , , , and 2 other author(s). ISWC (Posters, Demos & Industry Tracks), volume 1963 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)The Tale of Sansa Spark, , , , , , , , , and 2 other author(s). Proceedings of 16th International Semantic Web Conference, Poster & Demos, (2017)Few notes towards making honeyword system more secure and usable., and . SIN, page 237-245. ACM, (2015)Learning to Rank Query Graphs for Complex Question Answering over Knowledge Graphs., , , , , and . CoRR, (2018)Tag Digit Based Honeypot to Detect Shoulder Surfing Attack., and . SSCC, volume 467 of Communications in Computer and Information Science, page 101-110. Springer, (2014)On designing a modified-UI based honeyword generation approach for overcoming the existing limitations., and . Comput. Secur., (2017)