Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is FacePIN secure and usable?, and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 165-166. ACM, (2007)Securing passfaces for description., , and . SOUPS, page 24-35. ACM, (2008)The joy of cheques: trust, paper and eighty somethings., , , , , and . CSCW, page 147-156. ACM, (2012)Eighty something: banking for the older old., , , and . BCS HCI, page 64-73. ACM, (2011)Using IMUs to Identify Supervisors on Touch Devices., , , , , and . INTERACT (2), volume 9297 of Lecture Notes in Computer Science, page 565-583. Springer, (2015)A closer look at recognition-based graphical passwords on mobile devices., , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)Explainable Machine Learning for Fraud Detection., , , , , and . CoRR, (2021)HCI for Blockchain: Studying, Designing, Critiquing and Envisioning Distributed Ledger Technologies., , , , , , , and . CHI Extended Abstracts, ACM, (2018)Cheque mates: participatory design of digital payments with eighty somethings., , , , , , and . CHI, page 1189-1198. ACM, (2012)PosterVote: expanding the action repertoire for local political activism., , , , , , and . Conference on Designing Interactive Systems, page 795-804. ACM, (2014)