From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and insurance management in networks with heterogeneous agents., , и . EC, стр. 160-169. ACM, (2008)New directions in multisensory authentication., , и . SOUPS, ACM, (2009)Topics of Controversy: An Empirical Analysis of Web Censorship Lists., , , и . Proc. Priv. Enhancing Technol., 2017 (1): 42-61 (2017)Toward Mending Two Nation-Scale Brokered Identification Systems., , , и . Proc. Priv. Enhancing Technol., 2015 (2): 135-155 (2015)Toward a general collection methodology for Android devices., , и . Digit. Investig., 8 (Supplement): S14-S24 (2011)Audit Games with Multiple Defender Resources., , , , и . AAAI, стр. 791-797. AAAI Press, (2015)Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat., , , , , , , , и . CCS, стр. 295-310. ACM, (2017)Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China., , и . WWW, стр. 472-483. ACM / IW3C2, (2021)Undercover: authentication usable in front of prying eyes., , и . CHI, стр. 183-192. ACM, (2008)Can long passwords be secure and usable?, , , , , , , , , и . CHI, стр. 2927-2936. ACM, (2014)