From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , и . USENIX Security Symposium, стр. 499-514. USENIX Association, (2015)Advancing the Understanding of Android Unlocking and Usage., , и . WAY@SOUPS, USENIX Association, (2016)Open Problems in Web 2.0 User Content Sharing., и . iNetSeC, том 309 из IFIP Advances in Information and Communication Technology, стр. 37-51. Springer, (2009)Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model., , , , , и . ACM Trans. Internet Techn., 13 (1): 2:1-2:35 (2013)OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle., , и . Digital Identity Management, стр. 49-58. ACM, (2010)Do windows users follow the principle of least privilege?: investigating user account control practices., , и . SOUPS, том 485 из ACM International Conference Proceeding Series, ACM, (2010)Forecasting Suspicious Account Activity at Large-Scale Online Service Providers., , , , и . CoRR, (2018)Android Rooting: Methods, Detection, and Evasion., , и . SPSM@CCS, стр. 3-14. ACM, (2015)Efficient Authentication and Key Management Mechanisms for Smart Grid Communications., , , и . IEEE Syst. J., 8 (2): 629-640 (2014)Investigating user account control practices., , и . CHI Extended Abstracts, стр. 4129-4134. ACM, (2010)