Techniques for Continuous Touch-Based Authentication

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ISPEC (17. : 2022 : Taipeh) Information security practice and experience
1. Verfasser: Georgiev, Martin (VerfasserIn)
Weitere Verfasser: Eberz, Simon (VerfasserIn), Martinovic, Ivan (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Traceable and Revocable Attribute-based Encryption Scheme Based on Policy Hiding in Smart Healthcare Scenarios 2022 Zhao, Yang
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption 2022 Yuan, Jiaming
Attribute Based Tracing for Securing Group Signatures Against Centralized Authorities 2022 Perera, Maharage Nisansala Sevwandi
Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs 2022 Ghafoori, Nasratullah
Anonymous Authentication Protocols in Vehicular Ad Hoc Network-An Survey 2022 Fu, Guiwen
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems 2022 Tasopoulos, George
Detection of Adversarial Examples Based on the Neurons Distribution 2022 Zeng, Jiang-Yi
BADPASS: Bots Taking ADvantage of Proxy as a Service 2022 Chiapponi, Elisa
Sparse Attack on Skeleton-Based Human Action Recognition for Internet of Video Things Systems 2022 Huang, Yinqin
A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response 2022 Christian, Juan
Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry 2022 Talukder, Md Rakibul Hasan
Optimal Generic Attack Against Basic Boneh-Boyen Signatures 2022 Fu, Yen-Kang
Physical Zero-Knowledge Proof Protocol for Topswops 2022 Komano, Yuichi
Secure Human Identification Protocol with Human-Computable Passwords 2022 Matelski, Sławomir
Techniques for Continuous Touch-Based Authentication 2022 Georgiev, Martin
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning 2022 Quyen, Nguyen Huu
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance 2022 Viţel, Silviu
PriApp-Install: Learning User Privacy Preferences on Mobile Apps’ Installation 2022 Son, Ha Xuan
Detect Compiler Inserted Run-time Security Checks in Binary Software 2022 Pramanick, Koyel
UCC: Universal and Committee-based Cross-chain Framework 2022 Zhang, Yi
Alle Artikel auflisten