Author of the publication

Influencing users towards better passwords: persuasive cued click-points.

, , , and . BCS HCI (1), page 121-130. BCS, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SSOPrivateEye: Timely Disclosure of Single Sign-On Privacy Design Differences., , and . CoRR, (2022)"I'm Literally Just Hoping This Will Work: " Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities., , , and . SOUPS @ USENIX Security Symposium, page 263-280. USENIX Association, (2021)"Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices., and . SOUPS @ USENIX Security Symposium, page 197-216. USENIX Association, (2021)"It's not that I want to see the student's bedroom...": Instructor Perceptions of e-Proctoring Software., , , and . EuroUSEC, page 15-26. ACM, (2023)"I just want to play games with friends and it asked me for all of my information": Trading privacy for connection during the COVID-19 pandemic., , and . EuroUSEC, page 40-52. ACM, (2022)Heuristics for the evaluation of captchas on smartphones., , and . BCS HCI, page 126-135. ACM, (2015)Choose Your Own Authentication., , and . NSPW, page 1-15. ACM, (2015)Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends., , , and . eCrime, page 30-41. IEEE, (2016)Revisiting password rules: facilitating human management of passwords., , and . eCrime, page 81-90. IEEE, (2016)Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols., , , , and . USENIX Security Symposium, page 3811-3828. USENIX Association, (2021)