Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Interaction Design for Secure Systems.. ICICS, volume 2513 of Lecture Notes in Computer Science, page 278-290. Springer, (2002)Flexible Search and Navigation using Faceted Metadata, , , , and . (2002)Unpublished manuscript.Two-handed interaction on a tablet display.. CHI Extended Abstracts, page 1493-1496. ACM, (2004)Human Implications of Technology., and . The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Passpet: convenient password management and phishing protection., and . SOUPS, volume 149 of ACM International Conference Proceeding Series, page 32-43. ACM, (2006)Secure Interaction Design.. Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, page 114-115. Springer, (2004)Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features.. EVT, USENIX Association, (2007)Prerendered User Interfaces for Higher-Assurance Electronic Voting., , , and . EVT, USENIX Association, (2006)SeismoSpin: a physical instrument for digital data., , , , , and . CHI Extended Abstracts, page 832-833. ACM, (2003)Peephole displays: pen interaction on spatially aware handheld computers.. CHI, page 1-8. ACM, (2003)