From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions., , и . SP, стр. 375-390. IEEE Computer Society, (2009)Telepathwords: Preventing Weak Passwords by Reading Users' Minds., , , , и . USENIX Security Symposium, стр. 591-606. USENIX Association, (2014)How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks., и . Financial Cryptography, том 2742 из Lecture Notes in Computer Science, стр. 122-137. Springer, (2003)StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing., , и . IEEE Secur. Priv., 18 (3): 38-47 (2020)Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices.. HealthSec, USENIX Association, (2010)1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication., и . SOUPS, ACM, (2009)Access for sale: a new class of worm., и . WORM, стр. 19-23. ACM Press, (2003)The Emperor's New Security Indicators., , , и . S&P, стр. 51-65. IEEE Computer Society, (2007)Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud., и . WEIS, (2010)Your attention please: designing security-decision UIs to make genuine risks harder to ignore., , , , , , и . SOUPS, стр. 6:1-6:12. ACM, (2013)