Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Application to Java Card Applet Communication using a Password-authenticated Secure Channel., , , and . MoMM, page 147-156. ACM, (2014)Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers., , , and . ARES, page 38:1-38:10. ACM, (2018)CORMORANT: Ubiquitous Risk-Aware Multi-Modal Biometric Authentication across Mobile Devices., , , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (3): 85:1-85:23 (2019)On the state of V3 onion services., , and . FOCI@SIGCOMM, page 50-56. ACM, (2021)Diversity in locked and unlocked mobile device usage., , , , and . UbiComp Adjunct, page 379-384. ACM, (2014)Optimal derotation of shared acceleration time series by determining relative spatial alignment., , and . Int. J. Pervasive Comput. Commun., 11 (4): 454-466 (2015)Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage, , , and . Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, page 105-114. New York, NY, USA, Association for Computing Machinery (ACM), (2014)Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices., , and . MoMM, page 249. ACM, (2013)Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models., and . MoMM, page 288-291. ACM, (2016)The Android Platform Security Model., , , and . CoRR, (2019)