Author of the publication

Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass.

, , , , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 281-297. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 2-D vector excitation coding technique.. Signal Process., 67 (2): 163-172 (1998)Emerging NUI-based methods for user authentication.. ICCE, page 1. IEEE, (2018)Buyer-seller watermarking protocol based on amplitude modulation and the El Gamal Public Key Crypto System., and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 289-295. SPIE, (1999)Benchmarking steganographic and steganalysis techniques., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 252-263. SPIE, (2005)How to protect biometric templates., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650514. SPIE, (2007)Optimizing Prediction Gain in Symmetric Axial Scans., , and . ICIP, page 932-935. IEEE, (2000)Identity-Preserving Aging of Face Images via Latent Diffusion Models., , , , and . IJCB, page 1-10. IEEE, (2023)Detecting malicious logins in enterprise networks using visualization., , and . VizSEC, page 1-8. IEEE Computer Society, (2016)Effect of Video Pixel-Binning on Source Attribution of Mixed Media., , and . ICASSP, page 2545-2549. IEEE, (2021)Biometric-rich gestures: a novel approach to authentication on multi-touch devices., , , and . CHI, page 977-986. ACM, (2012)