Author of the publication

Authentication of users on mobile telephones - A survey of attitudes and practices.

, and . Comput. Secur., 24 (7): 519-527 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Providing Security in Container-Based HPC Runtime Environments., , , and . ISC Workshops, volume 9945 of Lecture Notes in Computer Science, page 685-695. (2016)An Identification of Variables Influencing the Establishment of Information Security Culture., , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 436-448. Springer, (2015)An analysis of home user security awareness & education., , and . ICITST, page 116-122. IEEE, (2017)Leveraging Biometrics for Insider Misuse Identification., , , and . Int. J. Cyber Situational Aware., 1 (1): 130-151 (2016)Personal Knowledge Management - Beyond Versioning., , and . LWA, page 242-249. Fakultät für Informatik, Otto-von-Guericke-Universität Magdeburg, (2011)A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications., , , and . ICISSP, page 246-251. SciTePress, (2019)Multi-Platform Authorship Verification., , , and . CECC, page 13:1-13:7. ACM, (2019)Information Security Risk Communication: A User-Centric Approach., , and . AICCSA, page 1-10. IEEE Computer Society, (2019)Advanced user authentication for mobile devices., and . Comput. Secur., 26 (2): 109-119 (2007)Android forensics: Correlation analysis., , , and . ICITST, page 157-162. IEEE, (2014)