From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Recovering High-Value Secrets with SGX and Social Authentication., , и . WAY@SOUPS, USENIX Association, (2016)Choice Architecture and Smartphone Privacy: There's a Price for That., , и . WEIS, (2012)Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , и . NDSS, The Internet Society, (2007)You've been warned: an empirical study of the effectiveness of web browser phishing warnings., , и . CHI, стр. 1065-1074. ACM, (2008)Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms., , и . CHI, стр. 1669-1678. ACM, (2015)It's not what you know, but who you know: a social approach to last-resort authentication., , и . CHI, стр. 1983-1992. ACM, (2009)Timing is everything?: the effects of timing and placement of online privacy indicators., , , и . CHI, стр. 319-328. ACM, (2009)Does my password go up to eleven?: the impact of password meters on password selection., , , , и . CHI, стр. 2379-2388. ACM, (2013)Privacy and Security Threat Models and Mitigation Strategies of Older Adults., , , , , и . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Disaster privacy/privacy disaster., , , , и . J. Assoc. Inf. Sci. Technol., 71 (9): 1002-1014 (2020)