Author of the publication

Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries.

, , , , , , and . EuroS&P Workshops, page 200-209. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight secure communication protocols for in-vehicle sensor networks., , , and . CyCAR@CCS, page 19-30. ACM, (2013)A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices., , , , and . IEEE Trans. Mob. Comput., 21 (4): 1155-1171 (2022)Channel surfing: defending wireless sensor networks from jamming and interference., , and . SenSys, page 403-404. ACM, (2006)Determining sink location through Zeroing-In attackers in wireless sensor networks., and . Wirel. Networks, 18 (3): 335-349 (2012)Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Regional Patterns and Vulnerability Analysis of Chinese Web Passwords., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 258-272 (2016)MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding., , , , , and . INFOCOM, page 357-366. IEEE, (2020)DepthFake: Spoofing 3D Face Authentication with a 2D Photo., , , , and . SP, page 917-91373. IEEE, (2023)WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens., , , , , , and . SP, page 984-1001. IEEE, (2022)Comparative study of the biases of MUSIC-like estimators, and . Signal Processing, 50 (1-2): 39--55 (April 1996)