Author of the publication

Security Keys: Practical Cryptographic Second Factors for the Modern Web.

, , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 422-440. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social Network User Lifetime., and . ASONAM, page 289-296. IEEE Computer Society, (2011)Security Keys: Practical Cryptographic Second Factors for the Modern Web., , , , and . Financial Cryptography, volume 9603 of Lecture Notes in Computer Science, page 422-440. Springer, (2016)Social Manipulation of Online Recommender Systems., , and . SocInfo, volume 6430 of Lecture Notes in Computer Science, page 125-139. Springer, (2010)Crawling Online Social Graphs., , and . APWeb, page 236-242. IEEE Computer Society, (2010)Anti-preferential Attachment: If I Follow You, Will You Follow Me?, and . SocialCom/PASSAT, page 339-346. IEEE Computer Society, (2011)