Cited By
View all- Shrestha PMahdad ASaxena N(2024)Sound-based Two-factor Authentication: Vulnerabilities and RedesignACM Transactions on Privacy and Security10.1145/363217527:1(1-27)Online publication date: 10-Jan-2024
- Nag AHassan MDas ASinha AChand NKar ASharma VAlkhayyat A(2024)Exploring the applications and security threats of Internet of Thing in the cloud computing paradigmTransactions on Emerging Telecommunications Technologies10.1002/ett.489735:4Online publication date: 8-Apr-2024
- Murali SJin WSivaraman VZhu HJi TLi PLi M(2023)Continuous Authentication Using Human-Induced Electric PotentialProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627124(409-423)Online publication date: 4-Dec-2023
- Show More Cited By