Author of the publication

A Field Study of User Behavior and Perceptions in Smartcard Authentication.

, , , , and . INTERACT (4), volume 6949 of Lecture Notes in Computer Science, page 1-17. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How the subject can improve fingerprint image quality., , , , and . J. Electronic Imaging, 17 (1): 011007 (2008)Avoiding Past Mistakes in Unethical Human Subjects Research: Moving From Artificial Intelligence Principles to Practice., , , , and . Computer, 57 (2): 53-63 (February 2024)Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords., , , , , , and . HCI (19), volume 8528 of Lecture Notes in Computer Science, page 131-139. Springer, (2014)Data Guardians' Behaviors and Challenges While Caring for Others' Personal Data., , , and . HCI (35), volume 14045 of Lecture Notes in Computer Science, page 163-183. Springer, (2023)Basing Cybersecurity Training on User Perceptions., , , and . IEEE Secur. Priv., 10 (2): 40-49 (2012)A methodology for penetration testing., , and . Comput. Secur., 8 (7): 613-620 (1989)Development of a test bed for evaluating human-robot performance for explosive ordnance disposal robots., , and . HRI, page 10-17. ACM, (2006)Clear, Unambiguous Password Policies: An Oxymoron?, , and . HCI (19), volume 8528 of Lecture Notes in Computer Science, page 240-251. Springer, (2014)Does habituation affect fingerprint quality?, , , , and . CHI Extended Abstracts, page 1427-1432. ACM, (2006)Usability Standards across the Development Lifecycle., and . HCI (16), volume 6776 of Lecture Notes in Computer Science, page 130-137. Springer, (2011)