From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Developers Are Users Too: Designing Crypto and Security APIs That Busy Engineers and Sysadmins Can Use Securely, и . (августа 2015)Semi-Supervised Audio Representation Learning for Modeling Beehive Strengths., , , , и . CoRR, (2021)Developers are Not the Enemy!: The Need for Usable Security APIs., и . IEEE Secur. Priv., 14 (5): 40-46 (2016)Spread of invasive ragweed: climate change, management and how to reduce allergy costs, , , , , , и . Journal of Applied Ecology, 50 (6): 1422--1430 (декабря 2013)Reduce response time: get "hooked" on a wiki., , и . SIGUCCS, стр. 185-189. ACM, (2007)Using 3D modelling and game engine technologies for interactive exploration of cultural heritage: An evaluation of four game engines in relation to roman archaeological heritage., , и . Digit. Appl. Archaeol. Cult. Heritage, (2019)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , и . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (августа 2018)No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantics-Preserving Transformations, , , и . Network and Distributed System Security (NDSS), ISOC, (2015)Participatory Design for Security-Related User Interfaces, , и . 22nd Annual Network and Distributed System Security Symposium, San Diego, California, USA, The Internet Society, (апреля 2015)"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS., , , , и . IEEE Symposium on Security and Privacy, стр. 246-263. IEEE, (2019)