From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hash visualization in user authentication.. CHI Extended Abstracts, стр. 279-280. ACM, (2000)Stopping spyware at the gate: a user study of privacy, notice and spyware., , , , , , и . SOUPS, том 93 из ACM International Conference Proceeding Series, стр. 43-52. ACM, (2005)Phoiling phishing., , , и . WWW, стр. 749. ACM, (2006)Preface.. Financial Cryptography, том 4886 из Lecture Notes in Computer Science, стр. 277-279. Springer, (2007)Why phishing works., , и . CHI, стр. 581-590. ACM, (2006)The Emperor's New Security Indicators., , , и . S&P, стр. 51-65. IEEE Computer Society, (2007)Use Your Illusion: secure authentication usable anywhere., , , и . SOUPS, стр. 35-45. ACM, (2008)Animated Exploration of Dynamic Graphs with Radial Layout., , , и . INFOVIS, стр. 43-50. IEEE Computer Society, (2001)The battle against phishing: Dynamic Security Skins., и . SOUPS, том 93 из ACM International Conference Proceeding Series, стр. 77-88. ACM, (2005)Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks., и . HIP, том 3517 из Lecture Notes in Computer Science, стр. 127-141. Springer, (2005)