Author of the publication

Teaching Authentication in High Schools: Challenges and Lessons Learned.

, , , and . ASE @ USENIX Security Symposium, USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory retrieval and graphical passwords., and . SOUPS, page 15:1-15:14. ACM, (2013)The Password Life Cycle., and . ACM Trans. Priv. Secur., 21 (3): 13:1-13:32 (2018)Exploring usability effects of increasing security in click-based graphical passwords., , , , and . ACSAC, page 79-88. ACM, (2010)Picking a (Smart)Lock: Locking Relationships on Mobile Devices., and . WAY@SOUPS, USENIX Association, (2016)A first look at the usability of bitcoin key management., , , and . CoRR, (2018)Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism., , , , and . IEEE Trans. Dependable Secur. Comput., 9 (2): 222-235 (2012)Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?, , and . HCI (27), volume 12788 of Lecture Notes in Computer Science, page 22-40. Springer, (2021)The MVP Web-Based Authentication Framework - (Short Paper)., , , , , , , , and . Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 16-24. Springer, (2012)Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors., , , and . HCI (30), volume 12210 of Lecture Notes in Computer Science, page 189-205. Springer, (2020)Multiple password interference in text passwords and click-based graphical passwords., , , , and . ACM Conference on Computer and Communications Security, page 500-511. ACM, (2009)