From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Authentication and Key Management Mechanisms for Smart Grid Communications., , , и . IEEE Syst. J., 8 (2): 629-640 (2014)Android Rooting: Methods, Detection, and Evasion., , и . SPSM@CCS, стр. 3-14. ACM, (2015)SoK: The Dual Nature of Technology in Sexual Abuse., , , и . SP, стр. 2320-2343. IEEE, (2022)Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , и . USENIX Security Symposium, стр. 499-514. USENIX Association, (2015)Forecasting Suspicious Account Activity at Large-Scale Online Service Providers., , , , и . CoRR, (2018)Open Problems in Web 2.0 User Content Sharing., и . iNetSeC, том 309 из IFIP Advances in Information and Communication Technology, стр. 37-51. Springer, (2009)OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle., , и . Digital Identity Management, стр. 49-58. ACM, (2010)Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model., , , , , и . ACM Trans. Internet Techn., 13 (1): 2:1-2:35 (2013)Do windows users follow the principle of least privilege?: investigating user account control practices., , и . SOUPS, том 485 из ACM International Conference Proceeding Series, ACM, (2010)It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls., , , , и . SafeConfig, стр. 53-62. ACM, (2010)