Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Translational Medical Research Ecosystem, , , , and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), (2011)Hey, You, Get Off of My Clipboard, , , , and . Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)GenderMag Improves Discoverability in the Field, Especially for Women: An Multi-Year Case Study of Suggest Edit, a Code Review Feature., , , , , , and . ICSE, page 189:1-189:12. ACM, (2024)Why eve and mallory love android: an analysis of android SSL (in)security, , , , , and . Proceedings of the 2012 ACM conference on Computer and communications security, page 50--61. New York, NY, USA, ACM, (2012)Using Personal Examples to Improve Risk Communication for Security &\#38; Privacy Decisions, , , and . Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, page 2647--2656. New York, NY, USA, ACM, (2014)A Promise Is A Promise: The Effect of Commitment Devices on Computer Security Intentions., , , , and . CHI, page 604. ACM, (2019)Visual Access Control for Research Ecosystems, and . Proc. of 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp. 114-119, (2011)Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes., , , , , , , , and . SOUPS, page 97-111. USENIX Association, (2016)POSTER: Android + Open Wi-Fis = Broken SSL?, , , and . (2013)Quantifying Users' Beliefs about Software Updates., , , , and . CoRR, (2018)