Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A digital file inventory of the Queens College Special Collections and Archives: Findings, analysis and recommendations for long-term preservation., , , , and . OCLC Syst. Serv., 30 (2): 78-90 (2014)GDT: A Toolkit for Grid Service Development., , and . NODe/GSEM, volume P-88 of LNI, page 131-147. GI, (2006)To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections, , , , and . 24th USENIX Security Symposium (USENIX Security 15), page 239--254. Washington, D.C., USENIX Association, (August 2015)Replication: Do We Snooze If We Can't Lose? Modelling Risk with Incentives in Habituation User Studies, , , , , and . Proceedings of the 2019 Workshop on Usable Security (USEC), USEC 2019, (February 2019)Pursuing the peak of excellence: Wiki as a knowledge base., and . SIGUCCS, page 167-172. ACM, (2008)Why eve and mallory love android: an analysis of android SSL (in)security, , , , , and . Proceedings of the 2012 ACM conference on Computer and communications security, page 50--61. New York, NY, USA, ACM, (2012)Exploring Design Directions for Wearable Privacy, , , and . (January 2017)You talkin' to me? Exploring Practical Attacks on Controller Pilot Data Link Communications., , , , , and . CPSS@AsiaCCS, page 53-64. ACM, (2021)A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems., , , , and . NDSS, The Internet Society, (2020)Towards a Mobile Security & Privacy Simulator, , and . Proceedings of 2011 IEEE Conference on Open Systems, page 95 - 100. (September 2011)