Personensuche
X
?
Proceedings of the CHI Conference on Human Factors in Computing Systems ,
3
SkullID: Through-Skull Sound Conduction based Authenticatio..:
, In:
?
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems ,
4
GestureMeter: Design and Evaluation of a Gesture Password S..:
, In:
?
Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems ,
5
On Smartphone Users' Difficulty with Understanding Implicit..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
6
Gesture Authentication for Smartphones: Evaluation of Gestu..:
, In:
?
22nd International Conference on Human-Computer Interaction with Mobile Devices and Services ,
7
Is Implicit Authentication on Smartphones Really Popular? O..:
, In:
?
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems ,
8
Voice Presentation Attack Detection through Text-Converted ..:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
9
The Personal Identification Chord : A Four ButtonAuthent..:
, In:
?
Proceedings of the 2018 World Wide Web Conference ,
10
I'm Listening to your Location! Inferring User Location wit..:
, In:
?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems ,
11
I'm too Busy to Reset my LinkedIn Password : On the Effe..:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
12
Boosting the Guessing Attack Performance on Android Lock Pa..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
13
POSTER : WiPING: Wi-Fi signal-based PIN Guessing attack:
, In:
?
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security ,
14
Surpass : System-initiated User-replaceable Passwords:
, In:
?
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems ,
15