1. Keystroke recognition using wifi signals;Ali,2015
2. The architecture of cognition;Anderson,2013
3. Does counting still count? Revisiting the security of counting based user authentication protocols against statistical attacks;Asghar,2013
4. A new human identification protocol and Coppersmith’s baby-step giant-step algorithm;Asghar,2010
5. Anti-hook shield against the software key loggers;Aslam,2004