Author of the publication

Secure or insure?: a game-theoretic analysis of information security games.

, , and . WWW, page 209-218. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smile for the Camera: Privacy and Policy Implications of Emotion AI., and . CoRR, (2017)One-step, three-factor authentication in a single earpiece., , , and . UbiComp/ISWC Adjunct, page 21-24. ACM, (2017)The evolving braid: how an organization in Uganda achieved reliable communications., , , and . ICTD (1), page 257-266. ACM, (2013)On characterizing affinity and its impact on network performance., , and . MoMeTools@SIGCOMM, page 65-75. ACM, (2003)Efficiency and Performance of Web Cache Reporting Strategies., , and . WISE Workshops, page 120-129. IEEE Computer Society, (2002)From Scanning Brains to Reading Minds: Talking to Engineers about Brain-Computer Interface., and . CHI, page 323. ACM, (2018)Social Distancing and Social Biosensing: Intersubjectivity from Afar., and . Comput. Support. Cooperative Work., 32 (2): 313-346 (June 2023)Sensing is Believing: What People Think Biosensors Can Reveal About Thoughts and Feelings., , and . Conference on Designing Interactive Systems, page 413-420. ACM, (2019)Innovations and Upgrades in Virtualized Network Architectures., and . NetEcon, page 6:1-6:11. USENIX Association, (2010)Exploring the Feasibility and Performance of One-step Three-factor Authentication with Ear-EEG., , , and . PhyCS, page 30-41. SciTePress, (2018)