All Stories

  1. Practical Privacy-Preserving Behaviour-Based Authentication on the Edge
  2. Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments
  3. Not Quite Yourself Today