Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Using Pulse-Response Biometrics., , , and . NDSS, The Internet Society, (2014)Using Reflexive Eye Movements for Fast Challenge-Response Authentication., , , and . ACM Conference on Computer and Communications Security, page 1056-1067. ACM, (2016)Towards smart individual-room heating for residential buildings., , and . Comput. Sci. Res. Dev., 31 (3): 127-134 (2016)Authentication using pulse-response biometrics., , , and . Commun. ACM, 60 (2): 108-115 (2017)Evaluating User Privacy in Bitcoin., , , , and . IACR Cryptology ePrint Archive, (2012)Device Pairing at the Touch of an Electrode., , and . NDSS, The Internet Society, (2018)Bionyms: Driver-centric Message Authentication using Biometric Measurements., , , and . VNC, page 1-8. IEEE, (2018)Generating Secret Keys from Biometric Body Impedance Measurements., , , , and . WPES@CCS, page 59-69. ACM, (2016)Misbehavior in Bitcoin: A Study of Double-Spending and Accountability., , , , and . ACM Trans. Inf. Syst. Secur., 18 (1): 2:1-2:32 (2015)Poster: Tracking Vehicles Through Encrypted Mix-Zones Using Physical Layer Properties., , , and . VNC, page 1-2. IEEE, (2018)