From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving text passwords through persuasion., , , и . SOUPS, стр. 1-12. ACM, (2008)The developer is the enemy., и . NSPW, стр. 89-97. ACM, (2008)Extending Cryptographic Logics of Belief to Key Agreement Protocols.. ACM Conference on Computer and Communications Security, стр. 232-243. ACM, (1993)Graphical passwords: Learning from the first twelve years., , и . ACM Comput. Surv., 44 (4): 19:1-19:41 (2012)Influencing users towards better passwords: persuasive cued click-points., , , и . BCS HCI (1), стр. 121-130. BCS, (2008)Secure Client and Server Geolocation Over the Internet., и . CoRR, (2019)CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud., и . ESORICS, том 5283 из Lecture Notes in Computer Science, стр. 130-145. Springer, (2008)Comparative Analysis and Framework Evaluating Web Single Sign-On Systems., и . CoRR, (2018)Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism., , , , и . IEEE Trans. Dependable Secur. Comput., 9 (2): 222-235 (2012)Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement.. IMACC, том 1025 из Lecture Notes in Computer Science, стр. 1. Springer, (1995)