Write to know: on the feasibility of wrist motion based user-authentication from handwriting | 0 | 0.34 | 2021 |
Advances In Secure Knowledge Management In The Artificial Intelligence Era | 0 | 0.34 | 2021 |
Acoustics to the Rescue: Physical Key Inference Attack Revisited | 0 | 0.34 | 2021 |
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles | 0 | 0.34 | 2021 |
Zoom On The Keystrokes: Exploiting Video Calls For Keystroke Inference Attacks | 1 | 0.37 | 2021 |
SMART LIGHT-BASED INFORMATION LEAKAGE ATTACKS | 0 | 0.34 | 2020 |
Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December 21-22, 2019, Proceedings | 0 | 0.34 | 2020 |
Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems. | 0 | 0.34 | 2020 |
Can Wearable Devices Facilitate A Drivers Brake Response Time In A Classic Car-Following Task ? | 0 | 0.34 | 2020 |
On Incentive Compatible Role-Based Reward Distribution in Algorand | 0 | 0.34 | 2020 |
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach | 0 | 0.34 | 2019 |
TangleCV - Decentralized Technique for Secure Message Sharing in Connected Vehicles. | 0 | 0.34 | 2019 |
deWristified: handwriting inference using wrist-based motion sensors revisited | 0 | 0.34 | 2019 |
Side-Channel Inference Attacks on Mobile Keypads using Smartwatches. | 3 | 0.42 | 2018 |
Light Ears: Information Leakage via Smart Lights. | 3 | 0.38 | 2018 |
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel. | 0 | 0.34 | 2018 |
A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables. | 0 | 0.34 | 2018 |
Towards A Practical Pedestrian Distraction Detection Framework Using Wearables | 0 | 0.34 | 2018 |
Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study. | 0 | 0.34 | 2018 |
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains. | 2 | 0.37 | 2018 |
A Framework for Inferring Combination Lock Codes using Smartwatches. | 0 | 0.34 | 2017 |
Preventing Shoulder Surfing Using Randomized Augmented Reality Keyboards | 0 | 0.34 | 2017 |
Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids. | 1 | 0.35 | 2017 |
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks. | 1 | 0.37 | 2017 |
A machine-learning based approach to privacy-aware information-sharing in mobile social networks. | 14 | 0.61 | 2016 |
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms. | 13 | 0.55 | 2016 |
(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches | 16 | 0.59 | 2015 |
Scalable Meter Data Collection in Smart Grids Through Message Concatenation | 7 | 0.48 | 2015 |
Optimal resource allocation in Cognitive Smart Grid Networks | 2 | 0.35 | 2015 |
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices | 11 | 0.56 | 2014 |
AgSec: Secure and efficient CDMA-based aggregation for smart metering systems | 0 | 0.34 | 2014 |
Social Puzzles: Context-Based Access Control in Online Social Networks | 0 | 0.34 | 2014 |
LocJam: A novel jamming-based approach to secure localization in wireless networks | 2 | 0.38 | 2014 |
On the scalable collection of metering data in smart grids through message concatenation. | 2 | 0.42 | 2013 |
Inferring social ties in pervasive networks: an on-campus comparative study | 3 | 0.41 | 2013 |
Inferring social ties in academic networks using short-range wireless communications | 6 | 0.46 | 2013 |
Optimizing mix-zone coverage in pervasive wireless networks | 3 | 0.39 | 2013 |
On the energy efficiency of dynamic spectrum access under dynamic channel conditions | 1 | 0.35 | 2013 |
Adaptive information-sharing for privacy-aware mobile social networks | 21 | 0.82 | 2013 |
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks | 2 | 0.38 | 2013 |
Big brother knows your friends: on privacy of social communities in pervasive networks | 5 | 0.43 | 2012 |
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. | 14 | 1.11 | 2012 |
Meetings through the cloud: Privacy-preserving scheduling on mobile devices | 14 | 0.70 | 2011 |
Optimizing mixing in pervasive networks: a graph-theoretic perspective | 5 | 0.55 | 2011 |
Privacy-preserving activity scheduling on mobile devices | 6 | 0.48 | 2011 |
Privacy in mobile computing for location-sharing-based services | 23 | 0.93 | 2011 |
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes | 8 | 0.67 | 2010 |
Towards a theory for securing time synchronization in wireless sensor networks | 3 | 0.54 | 2009 |
A distortion-based metric for location privacy | 44 | 1.78 | 2009 |
ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks | 2 | 0.39 | 2007 |