Personensuche
X
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
Oblivious Extractors and Improved Security in Biometric-Bas..:
, In:
?
2024 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW) ,
3
Exploring the Interplay Between Interaction Experience and ..:
, In:
?
Proceedings of the 36th Annual ACM Symposium on Applied Computing ,
4
A hidden-password online password manager:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
6
EchoVib: Exploring Voice Authentication via Unique Non-Line..:
, In:
?
Annual Computer Security Applications Conference ,
8
2D-2FA: A New Dimension in Two-Factor Authentication:
, In:
?
Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses ,
9
Practical Speech Re-use Prevention in Voice-driven Services:
, In:
?
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy ,
10
CREPE : A Privacy-Enhanced Crash Reporting System:
, In:
?
Annual Computer Security Applications Conference ,
11
Voicefox: Leveraging Inbuilt Transcription to Enhance the S..:
, In:
?
2019 17th International Conference on Privacy, Security and Trust (PST) ,
12
Stethoscope: Crypto Phones with Transparent & Robust Finger..:
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
14
On the Pitfalls of End-to-End Encrypted Communications :..:
, In:
?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ,
15