From post

On pairing constrained wireless devices based on secrecy of auxiliary channels: the case of acoustic eavesdropping.

, и . ACM Conference on Computer and Communications Security, стр. 97-108. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Eavesdropping over Random Passwords via Keyboard Acoustic Emanations., и . IACR Cryptology ePrint Archive, (2010)Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings., , , и . IEEE Trans. Inf. Forensics Secur., 11 (9): 1970-1983 (2016)Sensing-enabled channels for hard-to-detect command and control of mobile devices., , , , и . AsiaCCS, стр. 469-480. ACM, (2013)Sound-based Two-factor Authentication: Vulnerabilities and Redesign., , и . ACM Trans. Priv. Secur., 27 (1): 5:1-5:27 (2024)Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing., , , и . IEEE Trans. Dependable Secur. Comput., 10 (2): 57-69 (2013)SMASheD: Sniffing and Manipulating Android Sensor Data., , и . CODASPY, стр. 152-159. ACM, (2016)Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication., и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 85-104. Springer, (2022)EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech., , , , , и . AsiaCCS, стр. 67-81. ACM, (2021)HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks., , , , , , и . AsiaCCS, стр. 82-94. ACM, (2021)Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets., , , , , , и . MobiSys, стр. 96-109. ACM, (2023)