Format
Sort by

Send to

Choose Destination

Search results

Items: 3

1.

Covert lie detection using keyboard dynamics.

Monaro M, Galante C, Spolaor R, Li QQ, Gamberini L, Conti M, Sartori G.

Sci Rep. 2018 Jan 31;8(1):1976. doi: 10.1038/s41598-018-20462-6.

2.

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.

Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV, Wazid M, Das AK, Kumar N, Conti M, Vasilakos AV.

IEEE J Biomed Health Inform. 2018 Jul;22(4):1299-1309. doi: 10.1109/JBHI.2017.2721545. Epub 2017 Jun 29.

PMID:
28682267
3.

Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

Teing YY, Dehghantanha A, Choo KR, Dargahi T, Conti M.

J Forensic Sci. 2017 May;62(3):641-654. doi: 10.1111/1556-4029.13271. Epub 2016 Nov 25.

PMID:
27885663

Supplemental Content

Loading ...
Support Center