Author of the publication

Employing Smartwatch for Enhanced Password Authentication.

, , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 691-703. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mediated Hierarchical Identity-Based Combined Public Key Schemes., , , and . IITSI, page 614-618. IEEE Computer Society, (2010)DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5., , , , , and . Computers & Security, (2019)High Radix Montgomery Modular Multiplier on Modern FPGA., , , and . TrustCom/ISPA/IUCC, page 1484-1489. IEEE Computer Society, (2013)MJBlocker: A Lightweight and Run-Time Malicious JavaScript Extensions Blocker., , , , , and . SERE, page 119-128. IEEE, (2013)Employing Smartwatch for Enhanced Password Authentication., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 691-703. Springer, (2017)How to Block the Malicious Access to Android External Storage., , , , , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 287-303. Springer, (2018)