Author of the publication

Handwritten Signature Verification Using Wrist-Worn Devices.

, , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (3): 119:1-119:26 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup., , , and . CoRR, (2019)Leaking data from enterprise networks using a compromised smartwatch device., , and . SAC, page 741-750. ACM, (2018)PIT: A Probe Into Internet of Things by Comprehensive Security Analysis., , , and . TrustCom/BigDataSE, page 522-529. IEEE, (2019)9-1-1 DDoS: Attacks, Analysis and Mitigation., , and . EuroS&P, page 218-232. IEEE, (2017)Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs., , , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 223-237. Springer, (2011)BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness., , and . CoRR, (2020)Drones' Cryptanalysis - Smashing Cryptography with a Flicker., , , and . IEEE Symposium on Security and Privacy, page 1397-1414. IEEE, (2019)Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs., , , , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 342-351. Springer, (2018)A decision-theoretic approach to data mining., and . IEEE Trans. Syst. Man Cybern. Part A, 33 (1): 42-51 (2003)Speaker-to-speaker covert ultrasonic communication., , and . J. Inf. Secur. Appl., (2020)