From post

I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves.

, , , и . Financial Cryptography Workshops, том 7862 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Estimating Systematic Risk in Real-World Networks., , , и . Financial Cryptography, том 8437 из Lecture Notes in Computer Science, стр. 417-435. Springer, (2014)User-directed routing: from theory, towards practice., , и . NetEcon, стр. 1-6. ACM, (2008)Probabilistic Analysis of Correctness of High-Level Robot Behavior with Sensor Error., и . Robotics: Science and Systems, (2011)How many down?: toward understanding systematic risk in networks., , и . AsiaCCS, стр. 495-500. ACM, (2014)Developing a Radar Signal Simulator for the Community Radiative Transfer Model., , , , , , и . IEEE Trans. Geosci. Remote. Sens., (2023)Social Attitudes of AI Rebellion: A Framework., , , и . AAAI Workshops, том WS-17 из AAAI Technical Report, AAAI Press, (2017)Improving Physiological Signal Classification Using Logarithmic Quantization and a Progressive Calibration Technique., , , и . PhyCS, стр. 44-51. SciTePress, (2015)A New Approach to Temporal Planning with Rich Metric Temporal Properties., , , и . ICAPS, стр. 288-296. AAAI Press, (2017)Games of Timing for Security in Dynamic Environments., , и . GameSec, том 9406 из Lecture Notes in Computer Science, стр. 57-73. Springer, (2015)Learning to Estimate: A Case-Based Approach to Task Execution Prediction., , , , , и . ICCBR, том 9343 из Lecture Notes in Computer Science, стр. 15-29. Springer, (2015)