Author of the publication

Passwords for Everyone: Secure Mnemonic-based Accessible Authentication.

, , and . USENIX Annual Technical Conference, page 369-374. USENIX, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SensCrypt: A Secure Protocol for Managing Low Power Fitness Trackers., , and . ICNP, page 191-196. IEEE Computer Society, (2014)Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors., , and . IEEE Trans. Mob. Comput., 15 (5): 1197-1210 (2016)Pairwise Alignment of Protein Interaction Networks., , , , , and . Journal of Computational Biology, 13 (2): 182-199 (2006)Natural Language Watermarking and Tamperproofing., , , , , , and . Information Hiding, volume 2578 of Lecture Notes in Computer Science, page 196-212. Springer, (2002)Secure Management of Low Power Fitness Trackers., , and . IEEE Trans. Mob. Comput., 15 (2): 447-459 (2016)Inferring functional information from domain co-evolution., , , , and . Bioinformatics, 22 (1): 40-49 (2006)Enabling Multiple QR Codes in Close Proximity., , , and . CoRR, (2015)Liveness verifications for citizen journalism videos., , , and . WISEC, page 17:1-17:10. ACM, (2015)Runtime adaptive multi-factor authentication for mobile devices., , , , , and . IBM Journal of Research and Development, (2013)Information hiding through errors: a confusing approach., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050V. SPIE, (2007)