Search for persons
X
?
Computer Security – ESORICS 2020; Lecture Notes in Computer Science ,
1
Your PIN Sounds Good! Augmentation of PIN Guessing Strategi..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
PassGAN: A Deep Learning Approach for Password Guessing:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
3
SILK-TV: Secret Information Leakage from Keystroke Timing V..:
, In:
?
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ,
4
FLEX : A Flexible Code Authentication Framework for Dele..:
, In:
?
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society ,
5
Privacy-preserving User Matching:
, In:
?
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems ,
6
A multimodal data set for evaluating continuous authenticat..:
, In:
?
Proceedings of the 9th ACM symposium on Information, computer and communications security ,
7
Covert ephemeral communication in named data networking:
, In:
?
IEEE International Joint Conference on Biometrics ,
8
Privacy-preserving population-enhanced biometric key genera..:
, In:
?
Proceedings of the 9th ACM symposium on Information, computer and communications security ,
9
Privacy-preserving distance computation and proximity testi..:
, In:
?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society ,
10
Genodroid : are privacy-preserving genomic tests ready f..:
, In:
?
Proceedings of the 7th Asian Internet Engineering Conference ,
11
A new approach to securing audio conference tools:
, In:
?
Proceedings of the 18th ACM conference on Computer and communications security ,
12
Countering GATTACA : efficient and secure testing of ful..:
, In:
?
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society ,
13