From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

You Want Me To Do What? A Design Study of Two-Factor Authentication Messages., , и . SOUPS, USENIX Association, (2017)The post anachronism: the temporal dimension of facebook privacy., , , , , , и . WPES, стр. 1-12. ACM, (2013)An Observational Investigation of Reverse Engineers' Process and Mental Models., , , , и . CHI Extended Abstracts, ACM, (2019)SoK: Safer Digital-Safety Research Involving At-Risk Users., , , , , , , , , и 2 other автор(ы). CoRR, (2023)Applied Digital Threat Modeling: It Works., , , , и . IEEE Secur. Priv., 17 (4): 35-42 (2019)An Observational Investigation of Reverse Engineers' Processes., , , , и . CoRR, (2019)User Comfort with Android Background Resource Accesses in Different Contexts., , , , , и . SOUPS @ USENIX Security Symposium, стр. 235-250. USENIX Association, (2018)User Attitudes On Direct-to-Consumer Genetic Testing., , , , , и . EuroS&P, стр. 120-138. IEEE, (2020)Human Comprehension of Fairness in Machine Learning., , , , , и . AIES, стр. 152. ACM, (2020)We Are the Experts, and We Are the Problem: The Security Advice Fiasco.. CCS, стр. 7. ACM, (2022)