Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User-generated free-form gestures for authentication: security and memorability., , , , , , , and . MobiSys, page 176-189. ACM, (2014)Video: User-generated free-form gestures for authentication: security and memorability., , , , , , , and . MobiSys, page 391. ACM, (2014)Where Usability and Security Go Hand-in-Hand: Robust Gesture-Based Authentication for Mobile Systems., , and . CHI, page 374-386. ACM, (2017)Of Two Minds, Multiple Addresses, and One Ledger: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Users and Non-Users., , and . CHI, page 1656-1668. ACM, (2016)Guessing Attacks on User-Generated Gesture Passwords., , and . IMWUT, 1 (1): 3:1-3:24 (2017)Of Two Minds, Multiple Addresses, and One History: Characterizing Opinions, Knowledge, and Perceptions of Bitcoin Across Groups., , and . CoRR, (2015)Engineering Gesture-Based Authentication Systems., and . IEEE Pervasive Computing, 14 (1): 18-25 (2015)Quantifying the Security of Recognition Passwords: Gestures and Signatures., , , and . CoRR, (2018)Engineering Gesture-Based Authentication Systems., and . CoRR, (2014)Demo: Garda - robust gesture-based authentication for mobile systems., , and . UbiComp/ISWC Adjunct, page 253-256. ACM, (2017)