Author of the publication

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.

, , , , , , , , , and . USENIX Security Symposium, page 609-624. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Measurement of Systemic 2FA Usability., , , , , , and . USENIX Security Symposium, page 127-143. USENIX Association, (2020)Measuring Identity Confusion with Uniform Resource Locators., , , , , , , , and . CHI, page 1-12. ACM, (2020)TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication., , , , , , , , , and . USENIX Security Symposium, page 609-624. USENIX Association, (2017)Internationalized Back-of-the-Book Indexes for XSL Formatting Objects., and . Extreme Markup Languages®, (2002)A Tale of Two Studies: The Best and Worst of YubiKey Usability., , , , , and . IEEE Symposium on Security and Privacy, page 872-888. IEEE Computer Society, (2018)The Impact of Secure Transport Protocols on Phishing Efficacy., , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Using computational swarm intelligence for real-time asset allocation., , , and . CISDA, page 1-5. IEEE, (2015)Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations., , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 166-185. Springer, (2022)Digital dispersion compensation in optical coherence tomography., , , and . ISBI, page 621-624. IEEE, (2002)Apocrita: a distributed peer-to-peer file sharing system for intranets., , and . ACM Southeast Regional Conference, page 174-178. ACM, (2007)