Home > Research > Browse

Results for Authentication

Publications & Outputs

  1. A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In : Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal article

  2. Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 14/01/2019, In : IEEE Transactions on Emerging Topics in Computing. 6 p.

    Research output: Contribution to journalJournal article

  3. Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  4. Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Back-of-Device authentication on smartphones

    De Luca, A., Von Zezschwitz, E., Nguyen, N. D. H., Maurer, M-E., Rubegni, E., Scipioni, M. P. & Langheinrich, M., 2013, CHI '13 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Pages 2389-2398. ACM, p. 2389-2398 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. Towards a Secure and Seamless Host Mobility for the real world

    Georgopoulos, P., McCarthy, B. & Edwards, C., 2011, Wireless On-Demand Network Systems and Services (WONS), 2011 Eighth International Conference on. IEEE, p. 134-141 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Spontaneous mobile device authentication based on sensor data

    Mayrhofer, R. & Gellersen, H., 08/2008, In : Information Security Technical Report. 13, 3, p. 136-150 15 p.

    Research output: Contribution to journalJournal article