From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

End User and Expert Perceptions of Threats and Potential Countermeasures., , и . EuroS&P Workshops, стр. 230-239. IEEE, (2020)Exploring Design Directions for Wearable Privacy, , , и . (января 2017)Who Are You Now? Fading to Multiple Personas., , и . WAY@SOUPS, USENIX Association, (2016)Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches., , , и . CoRR, (2019)Smart Privacy Visor: Bridging the Privacy Gap., , , и . BIS (Workshops), том 228 из Lecture Notes in Business Information Processing, стр. 235-247. Springer, (2015)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 79-90. Springer, (2014)On the Usability of Authenticity Checks for Hardware Security Tokens., , , , , , , и . USENIX Security Symposium, стр. 37-54. USENIX Association, (2021)IPv6 Security, , , , и . стр. 227-254. Magdeburger Institut für Sicherheitsforschung, Magdeburg, (2015)IPv6 Security: Attacks and Countermeasures in a Nutshell., , , , и . WOOT, USENIX Association, (2014)Mental Models of Adversarial Machine Learning., , , и . CoRR, (2021)