From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fast and Secure Authentication in Virtual Reality Using Coordinated 3D Manipulation and Pointing., , , и . ACM Trans. Comput. Hum. Interact., 28 (1): 6:1-6:44 (2021)I Don't Need an Expert! Making URL Phishing Features Human Comprehensible., , и . CHI, стр. 695:1-695:17. ACM, (2021)Understanding Privacy Switching Behaviour on Twitter., , и . CHI, стр. 31:1-31:14. ACM, (2022)Änyone Else Seeing this Error?": Community, System Administrators, and Patch Information., , , и . EuroS&P, стр. 105-119. IEEE, (2020)RubikAuth: Fast and Secure Authentication in Virtual Reality., , , и . CHI Extended Abstracts, стр. 1-9. ACM, (2020)Lessons learned from the deployment of a smartphone-based access-control system., , , и . SOUPS, том 229 из ACM International Conference Proceeding Series, стр. 64-75. ACM, (2007)Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research., , и . VR, стр. 301-310. IEEE, (2022)Virtual Reality Observations: Using Virtual Reality to Augment Lab-Based Shoulder Surfing Research., , , и . VR, стр. 291-300. IEEE, (2022)Tales of Software Updates: The process of updating software., и . CHI, стр. 3215-3226. ACM, (2016)Phishing Codebook: A Structured Framework for the Characterization of Phishing Emails., , , и . CoRR, (2024)