Cited By
View all- Mahfouz A(2024)User Authentication in the IoT and IIoT EnvironmentSmart and Agile Cybersecurity for IoT and IIoT Environments10.4018/979-8-3693-3451-5.ch008(169-194)Online publication date: 30-Jun-2024
- Cao YDhekne AAmmar M(2024)SigningRing: Signature-based Authentication using Inertial Sensors on a Ring Form-factorProceedings of the Workshop on Body-Centric Computing Systems10.1145/3662009.3662019(11-16)Online publication date: 3-Jun-2024
- Zhou MZhou YSu SWang QLi QHu SYu CLi Z(2024)FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction SoundIEEE Transactions on Mobile Computing10.1109/TMC.2023.333814823:6(7210-7224)Online publication date: Jun-2024
- Show More Cited By