Author of the publication

Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks

, , , and . CHI Conference on Human Factors in Computing Systems, CHI '12, Austin, TX, USA - May 05 - 10, 2012, page 2045--2048. ACM, (2012)
DOI: 10.1145/2207676.2208352

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimenting with ubiquitous computing technologies in productive environments., , , , and . Elektrotechnik und Informationstechnik, 123 (4): 135-139 (2006)Integrating material and digital: a new way for cultural heritage., , , , , and . Interactions, 20 (4): 58-63 (2013)Applying wearable sensors to avalanche rescue., , , and . Computers & Graphics, 27 (6): 839-847 (2003)There is more to context than location., , and . Computers & Graphics, 23 (6): 893-901 (1999)WorldCupinion Experiences with an Android App for Real-Time Opinion Sharing During Soccer World Cup Games., , , , and . IJMHCI, 3 (4): 18-35 (2011)Methods and guidelines for the design and development of domestic ubiquitous computing applications., , and . Pervasive and Mobile Computing, 3 (6): 721-738 (2007)Driving Automotive User Interface Research., , and . IEEE Pervasive Computing, 9 (1): 85-88 (2010)Smart Textiles: From Niche to Mainstream., , , , , , and . IEEE Pervasive Computing, 12 (3): 81-84 (2013)Pervasive Computing for Transit and Transport., , and . IEEE Pervasive Computing, 12 (1): 14-16 (2013)A Revolution in the Making Guest editors' introduction., , , and . IEEE Pervasive Computing, 13 (3): 18-21 (2014)