Author of the publication

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.

, , , , , and . NDSS, The Internet Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems., , , , and . NDSS, The Internet Society, (2016)Sensor-Based Proximity Detection in the Face of Active Adversaries., , , and . IEEE Trans. Mob. Comput., 18 (2): 444-457 (2019)Authenticating public terminals., , , and . Computer Networks, 31 (8): 861-870 (1999)Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application., , , , , and . IEEE Trans. Computers, 66 (10): 1717-1733 (2017)Mobile Trusted Computing., , , , , , , and . Proceedings of the IEEE, 102 (8): 1189-1206 (2014)All You Need is: Evading Hate Speech Detection., , , , and . AISec@CCS, page 2-12. ACM, (2018)The Circle Game: Scalable Private Membership Test Using Trusted Hardware., , , , , and . AsiaCCS, page 31-44. ACM, (2017)The Untapped Potential of Trusted Execution Environments on Mobile Devices., , and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 293-294. Springer, (2013)Ad Hoc Security Associations for Groups., , and . ESAS, volume 4357 of Lecture Notes in Computer Science, page 150-164. Springer, (2006)Usable Mobile Security., and . ICDCIT, volume 7154 of Lecture Notes in Computer Science, page 1-6. Springer, (2012)