Author of the publication

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces.

, , , , , and . USENIX Security Symposium, page 143-158. USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and detecting anomalous topic access., , , , , and . ISI, page 100-105. IEEE, (2013)Role Mining with Probabilistic Models., , and . ACM Trans. Inf. Syst. Secur., 15 (4): 15:1-15:28 (2013)What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications., , , , and . IEEE Trans. Information Forensics and Security, 10 (1): 200-212 (2015)Subliminal Probing for Private Information via EEG-Based BCI Devices., , , , , , , and . CoRR, (2013)Developments in ROOT I/O and trees, , , , , , and . CoRR, (2009)Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices., , , and . CoRR, (2015)Short paper: smartphones: not smart enough?, , , and . SPSM@CCS, page 27-32. ACM, (2012)A probabilistic approach to hybrid role mining., , , and . ACM Conference on Computer and Communications Security, page 101-111. ACM, (2009)A theoretical and experimental investigation of the systematic errors and statistical uncertainties of Time-Of-Flight-cameras., , , and . IJISTA, 5 (3/4): 402-413 (2008)Selecting the rank of truncated SVD by maximum approximation capacity., and . ISIT, page 1036-1040. IEEE, (2011)