Cited By
View all- Wan TZhang LXu YGuo ZGao BLiang H(2024)Analysis and Design of Efficient Authentication Techniques for Password Entry with the Qwerty Keyboard for VR EnvironmentsIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2024.345619530:11(7075-7085)Online publication date: 1-Nov-2024
- Champa ARabbi MEishita FZibran M(2024)Are We Aware? An Empirical Study on the Privacy and Security Awareness of Smartphone SensorsSoftware Engineering and Management: Theory and Application10.1007/978-3-031-55174-1_10(139-158)Online publication date: 3-May-2024
- Guri M(2023) POWER-SUPPLaY: Leaking Sensitive Data From Air-Gapped, Audio-Gapped Systems by Turning the Power Supplies into Speakers IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313340620:1(313-330)Online publication date: 1-Jan-2023
- Show More Cited By