Cited By
View all- Tan JWang XNguyen CShi Y(2018)SilentKeyProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/31917682:1(1-18)Online publication date: 26-Mar-2018
This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we collected a dataset with a generate-test-retest paradigm where participants (N=63) generated free-form gestures, repeated ...
Wearable technologies such as smart-glasses can sense, store and display sensitive personal contents. In order to protect this data, users need to securely authenticate to their devices. However, current authentication techniques, such as passwords or ...
Proxy multi-signature is a scheme that allows a proxy signer to sign messages on behalf of a group of original signers. To our best knowledge, most of the existing proxy multi-signature schemes are proposed in public key infrastructure or identity-based ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in