Year |
Citation |
Score |
2017 |
Azimpourkivi M, Topkara U, Carbunar B. Camera Based Two Factor Authentication Through Mobile and Wearable Devices Arxiv: Cryptography and Security. 1: 35. DOI: 10.1145/3131904 |
0.367 |
|
2016 |
Rahman M, Topkara U, Carbunar B. Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors Ieee Transactions On Mobile Computing. 15: 1197-1210. DOI: 10.1109/Tmc.2015.2456904 |
0.305 |
|
2016 |
Rahman M, Carbunar B, Topkara U. Secure management of low power fitness trackers Ieee Transactions On Mobile Computing. 15: 447-459. DOI: 10.1109/Tmc.2015.2418774 |
0.343 |
|
2013 |
Castro PC, Ligman JW, Pistoia M, Ponzo J, Thomas GS, Topkara U. Runtime adaptive multi-factor authentication for mobile devices Journal of Reproduction and Development. 57: 2. DOI: 10.1147/Jrd.2013.2281123 |
0.339 |
|
2007 |
Topkara U, Atallah MJ, Topkara M. Passwords decay, words endure: Secure and re-usable multiple password mnemonics Proceedings of the Acm Symposium On Applied Computing. 292-299. DOI: 10.1145/1244002.1244072 |
0.528 |
|
2007 |
Topkara M, Topkara U, Atallah MJ. Information hiding through errors: A confusing approach Proceedings of Spie - the International Society For Optical Engineering. 6505. |
0.409 |
|
2006 |
Topkara M, Topkara U, Atallah MJ. Words are not enough: Sentence level natural language watermarking Proceedings of the Acm International Multimedia Conference and Exhibition. 37-46. DOI: 10.1145/1178766.1178777 |
0.52 |
|
2006 |
Taskiran CM, Topkara U, Topkara M, Delp EJ. Attacks on lexical natural language steganography systems Proceedings of Spie - the International Society For Optical Engineering. 6072. DOI: 10.1117/12.649551 |
0.356 |
|
2006 |
Topkara U, Topkara M, Atallah MJ. The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions Proceedings of the Multimedia and Security Workshop 2006, Mm and Sec'06. 2006: 164-174. |
0.539 |
|
2005 |
Jeyaraman S, Topkara U. Have the cake and eat it too - Infusing usability into text-password based authentication systems Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 473-482. DOI: 10.1109/CSAC.2005.28 |
0.541 |
|
2004 |
Topkara M, Topkara U, Atallah MJ, Taskiran C, Lin E, Delp EJ. A hierarchical protocol for increasing the stealthiness of steganographic methods Proceedings of the Multimedia and Security Workshop 2004, Mm and Sec'04. 16-24. |
0.485 |
|
2003 |
Atallah MJ, Raskin V, Hempelmann CF, Karahan M, Sion R, Topkara U, Triezenberg KE. Natural language watermarking and tamperproofing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2578: 196-212. |
0.522 |
|
Show low-probability matches. |