Author of the publication

Hey, You, Get Off of My Clipboard

, , , , and . Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
DOI: 10.1007/978-3-642-39884-1_12

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coupled multi-agent simulations for mobile security & privacy research., , and . DEST, page 1-6. IEEE, (2012)Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . Proceedings of the 2019 Workshop on Usable Security (USEC), USEC 2019, (February 2019)Pursuing the peak of excellence: Wiki as a knowledge base., and . SIGUCCS, page 167-172. ACM, (2008)Why eve and mallory love android: an analysis of android SSL (in)security, , , , , and . Proceedings of the 2012 ACM conference on Computer and communications security, page 50--61. New York, NY, USA, ACM, (2012)Debunking Security-Usability Tradeoff Myths, , , , and . IEEE Security & Privacy, 14 (5): 33--39 (2016)Ami - The chemist's amanuensis., , , , , , , , and . J. Cheminformatics, (2011)Exploring Design Directions for Wearable Privacy, , , and . (January 2017)Exploring the security narrative in the work context., , and . J. Cybersecur., (2020)Medical Case-Driven Classification of Microblogs: Characteristics and Annotation, , , and . Proc. of ACM SIGHIT International Health Informatics Symposium (IHI 2012), Miami, Florida, USA, January 28-30, 2012, (2011)An Implementation of the Fully Homomorphic Smart-Vercauteren Crypto-System, , and . Proc. of the 18th ACM Conference on Computer and Communications Security (ACM CCS 2011), ACM, (2011)