From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Handbook of Applied Cryptography, , , и . (1997)The developer is the enemy., и . NSPW, стр. 89-97. ACM, (2008)Influencing users towards better passwords: persuasive cued click-points., , , и . BCS HCI (1), стр. 121-130. BCS, (2008)Extending Cryptographic Logics of Belief to Key Agreement Protocols.. ACM Conference on Computer and Communications Security, стр. 232-243. ACM, (1993)Improving text passwords through persuasion., , , и . SOUPS, стр. 1-12. ACM, (2008)Weighing Down "The Unbearable Lightness of PIN Cracking"., и . Financial Cryptography, том 5143 из Lecture Notes in Computer Science, стр. 176-181. Springer, (2008)Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract)., и . Financial Cryptography, том 3110 из Lecture Notes in Computer Science, стр. 39-53. Springer, (2004)Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement.. IMACC, том 1025 из Lecture Notes in Computer Science, стр. 1. Springer, (1995)Baton: certificate agility for android's decentralized signing infrastructure., , , и . WISEC, стр. 1-12. ACM, (2014)Exploration and Field Study of a Password Manager Using Icon-Based Passwords., , , и . Financial Cryptography Workshops, том 7126 из Lecture Notes in Computer Science, стр. 104-118. Springer, (2011)