Author of the publication

Neural Underpinnings of Website Legitimacy and Familiarity Detection: An fNIRS Study.

, , and . WWW, page 1571-1580. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data remanence effects on memory-based entropy collection for RFID systems., and . Int. J. Inf. Sec., 10 (4): 213-222 (2011)On the Privacy of Peer-Assisted Distribution of Security Patches., , , , and . Peer-to-Peer Computing, page 1-10. IEEE, (2010)Curbing mobile malware based on user-transparent hand movements., , , , and . PerCom, page 221-229. IEEE Computer Society, (2015)Opportunistic Human Observation Attacks: Perils in Designing Zero-Effort Deauthentication., , , , and . CoRR, (2015)Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population, , and . CoRR, (2009)Crashing Privacy: An Autopsy of a Web Browser's Leaked Crash Reports., and . CoRR, (2018)Walk-Unlock: Zero-Interaction Authentication Protected with Multi-Modal Gait Biometrics., , and . CoRR, (2016)Noisy Vibrational Pairing of IoT Devices., and . IEEE Trans. Dependable Sec. Comput., 16 (3): 530-545 (2019)Two-Factor Authentication with End-to-End Password Security., , , and . Public Key Cryptography (2), volume 10770 of Lecture Notes in Computer Science, page 431-461. Springer, (2018)YELP: masking sound-based opportunistic attacks in zero-effort deauthentication., , and . WISEC, page 195-206. ACM, (2017)