From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

What matters to users?: factors that affect users' willingness to share information with online advertisers., , , , , , , , и . SOUPS, стр. 7:1-7:12. ACM, (2013)Exploring reactive access control., , , , , и . CHI, стр. 2085-2094. ACM, (2011)Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising., , , , , и . CHI, стр. 589-598. ACM, (2012)Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , и . USENIX Security Symposium, стр. 463-481. USENIX Association, (2015)Telepathwords: Preventing Weak Passwords by Reading Users' Minds., , , , и . USENIX Security Symposium, стр. 591-606. USENIX Association, (2014)Password policy simulation and analysis., , и . Digital Identity Management, стр. 1-10. ACM, (2007)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , и . CHI, стр. 2903-2912. ACM, (2015)"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking., , , и . CHI, стр. 2657-2666. ACM, (2014)Smart, useful, scary, creepy: perceptions of online behavioral advertising., , , , и . SOUPS, стр. 4. ACM, (2012)Exploring reactive access control., , , и . CHI Extended Abstracts, стр. 4417-4422. ACM, (2010)