Secure multi-party computation (MPC) techniques can be used to provide d...
Users embrace the rapid development of virtual reality (VR) technology. ...
Voice-controlled smart speaker devices have gained a foothold in many mo...
Application authentication is typically performed using some form of sec...
We propose a two-factor authentication (2FA) mechanism called 2D-2FA to
...
In this paper, we introduce PASSAT, a practical system to boost the secu...
Voice-driven services (VDS) are being used in a variety of applications
...
Single-Board Computers (SBC) refer to pocket-sized computers built on a
...