Author of the publication

Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.

, , , , , and . SECON, page 1-2. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Juuti, Mika
add a person with the name Juuti, Mika
 

Other publications of authors with the same name

PRADA: Protecting against DNN Model Stealing Attacks., , , , and . CoRR, (2018)PRADA: Protecting Against DNN Model Stealing Attacks., , , and . EuroS&P, page 512-527. IEEE, (2019)Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews., , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 132-151. Springer, (2018)Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks., , , , , and . NDSS, The Internet Society, (2016)Stochastic Discriminant Analysis., , and . IJCNN, page 1-8. IEEE, (2015)STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification., , , , , and . SECON, page 1-9. IEEE, (2017)All You Need is: Evading Hate Speech Detection., , , , and . AISec@CCS, page 2-12. ACM, (2018)TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition., , , , , and . CoRR, (2016)Making Targeted Black-box Evasion Attacks Effective and Efficient., , and . AISec@CCS, page 83-94. ACM, (2019)All You Need is "Love": Evading Hate-speech Detection., , , , and . CoRR, (2018)