Cited By
View all- Yuhala PMénétrey JFelber PPasin MSchiavoni VHong JPark J(2024)Fortress: Securing IoT Peripherals with Trusted Execution EnvironmentsProceedings of the 39th ACM/SIGAPP Symposium on Applied Computing10.1145/3605098.3635994(243-250)Online publication date: 8-Apr-2024
- Michele MJattke PZibung JRazavi K(2024)PayRide: Secure Transport e-Ticketing with Untrusted Smartphone LocationDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_14(261-282)Online publication date: 17-Jul-2024
- Wang CXiao YGao XLi LWang J(2023)A Framework for Behavioral Biometric Authentication Using Deep Metric Learning on Mobile DevicesIEEE Transactions on Mobile Computing10.1109/TMC.2021.307260822:1(19-36)Online publication date: 1-Jan-2023
- Show More Cited By