From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You., , , , и . WEIS, (2015)Use Your Illusion: secure authentication usable anywhere., , , и . SOUPS, стр. 35-45. ACM, (2008)Automatically Detecting Vulnerable Websites Before They Turn Malicious., и . USENIX Security Symposium, стр. 625-640. USENIX Association, (2014)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , и . SOUPS, стр. 123-140. USENIX Association, (2015)Diversify to Survive: Making Passwords Stronger with Adaptive Policies., , , , , , , , , и . SOUPS, стр. 1-12. USENIX Association, (2017)Adaptive Regret Minimization in Bounded-Memory Games, , , и . CoRR, (2011)A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers., , и . CoRR, (2016)Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking., , и . ACM Trans. Internet Techn., 18 (4): 54:1-54:19 (2018)Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda., , , и . AppFM@FM, том 349 из EPTCS, стр. 77-84. (2021)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , и . CCS, стр. 3399-3401. ACM, (2022)