ABSTRACT
No abstract available.
- Are your company's IoT devices secure? Altman Vilandrie & Company, 2017.Google Scholar
- S. Eberz, G. Lovisotto, A. Patane, M. Kwiatkowska, V. Lenders, and I. Martinovic. When your fitness tracker betrays you: Quantifying the predictability of biometric features across contexts. pages 889--905. IEEE Symposium on Security and Privacy, May 2018.Google ScholarCross Ref
- M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. pages 1528--1540. ACM CCS, October 2016. Google ScholarDigital Library
- Y. Xu, T. Price, J.-M. Frahm, and F. Monrose. Virtual u: Defeating face liveness detection by building virtual models from your public photos. In USENIX security symposium, pages 497--512, 2016. Google ScholarDigital Library
- M. Zhao, T. Li, M. A. Alsheikh, Y. Tian, H. Zhao, A. Torralba, and D. Katabi. Through-wall human pose estimation using radio signals. pages 7356--7365. IEEE CVPR, June 2018.Google Scholar
- Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop
Recommendations
New Features of Authentication Scheme for the IoT: A Survey
IoT S&P'19: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-ThingsWith the development of cloud computing and artificial intelligence, the Internet of Things (IoT) products are gradually entering every corner of our lives and changing the way we live. Yet traditional computer authentication protocol cannot be used ...
IoT Security Development Framework for building trustworthy Smart car services
2016 IEEE Conference on Intelligence and Security Informatics (ISI)The Internet of Things (IoT) will connect not only computers and mobile devices, but it will also interconnect Smart cars, buildings, homes, and cities, as well as electrical grids, gas, and water networks, automobiles, airplanes, etc. However, with the ...
Comments