From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: Perceptions of Handling Sensitive Data in Cloud Office Applications, , , , , , и . In 41st IEEE Symposium on Security and Privacy, IEEE S&P 2020, May 18-20, 2020, (мая 2020)Hey, You, Get Off of My Clipboard, , , , и . Financial Cryptography and Data Security, том 7859 из Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)Securing Your Crypto-API Usage Through Tool Support - A Usability Study., , , , , , , , и . SecDev, стр. 14-25. IEEE, (2023)"Would You Give the Same Priority to the Bank and a Game? I Do Not!" Exploring Credential Management Strategies and Obstacles during Password Manager Setup., , , , и . SOUPS, стр. 171-190. USENIX Association, (2023)If You Can't Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers., , , , , , и . SOUPS @ USENIX Security Symposium, стр. 313-330. USENIX Association, (2022)Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs., , , и . CHI, стр. 1-13. ACM, (2020)How Internet Resources Might Be Helping You Develop Faster but Less Securely., , , , , и . IEEE Security & Privacy, 15 (2): 50-60 (2017)Poster: Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , и . In Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018, (августа 2018)(Un)informed Consent: Studying GDPR Consent Notices in the Field., , , , и . ACM Conference on Computer and Communications Security, стр. 973-990. ACM, (2019)"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments., , , , , , и . CCS, стр. 3138-3152. ACM, (2023)