Cited By
View all- Johnson MSinganamalla SDurand NJang ESevilla SHeimerl KSekar VYu MSeneviratne AVeitch D(2024)dAuth: A Resilient Authentication Architecture for Federated Private Cellular NetworksProceedings of the ACM SIGCOMM 2024 Conference10.1145/3651890.3672263(373-391)Online publication date: 4-Aug-2024
- Alatawi MSaxena NVilela JSchulmann HLi N(2024)Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of SignalProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653251(277-288)Online publication date: 19-Jun-2024
- Jiang CXu CHan YZhang ZChen K(2024)Two-Factor Authenticated Key Exchange From Biometrics With Low Entropy RatesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337281219(3844-3856)Online publication date: 2024
- Show More Cited By