Cited By
View all- Guntrum L(2024)Keyboard Fighters: The Use of ICTs by Activists in Times of Military Coup in MyanmarProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642279(1-19)Online publication date: 11-May-2024
- Pöhn DGruschka NZiegler LBüttner A(2023)A framework for analyzing authentication risks in account networksComputers and Security10.1016/j.cose.2023.103515135:COnline publication date: 1-Dec-2023
- Singh PSamuel HJaafar FAmeyed D(2022)Enhancing Biometric Security with Combinatorial and Permutational Multi-Fingerprint Authentication Strategies2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927942(1-7)Online publication date: 12-Sep-2022
- Show More Cited By