Author of the publication

Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness.

, , and . TRUST, volume 9824 of Lecture Notes in Computer Science, page 40-59. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible patient-controlled security for electronic health records., , , and . IHI, page 727-732. ACM, (2012)Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones., , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 237-253. Springer, (2015)On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?, , , , and . ACSAC, page 191-200. ACM, (2015)Exit from Hell? Reducing the Impact of Amplification DDoS Attacks., , , and . USENIX Security Symposium, page 111-125. USENIX Association, (2014)An Empirical Study on Price Differentiation Based on System Fingerprints., , , and . CoRR, (2017)May the Force Be with You: The Future of Force-Sensitive Authentication., , and . IEEE Internet Comput., 21 (3): 64-69 (2017)Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks., , , and . WOOT, USENIX Association, (2014)An Empirical Study on Online Price Differentiation., , , and . CODASPY, page 76-83. ACM, (2018)Going Wild: Large-Scale Classification of Open DNS Resolvers., , , , and . Internet Measurement Conference, page 355-368. ACM, (2015)Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices., , and . SOUPS, page 207-219. USENIX Association, (2016)