Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security issues in online games., and . Electron. Libr., 20 (2): 125-133 (2002)Security Design in Online Games.. ACSAC, page 286-295. IEEE Computer Society, (2003)A note on proactive password checking.. NSPW, page 127-135. ACM, (2001)A systematic classification of cheating in online games., and . NETGAMES, page 1-9. ACM, (2005)An Investigation of Cheating in Online Games., and . IEEE Secur. Priv., 7 (3): 37-44 (2009)An Attack on A Traitor Tracing Scheme., and . IACR Cryptology ePrint Archive, (2001)Password Memorability and Security: Empirical Results., , , and . IEEE Secur. Priv., 2 (5): 25-31 (2004)