Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Choose Your Own Authentication., , and . NSPW, page 1-15. ACM, (2015)User interface design affects security: patterns in click-based graphical passwords., , , and . Int. J. Inf. Sec., 8 (6): 387-398 (2009)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , and . CHI, page 2903-2912. ACM, (2015)Helping users create better passwords: is this the right approach?, , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 151-152. ACM, (2007)Exploring usability effects of increasing security in click-based graphical passwords., , , , and . ACSAC, page 79-88. ACM, (2010)Persuasion for Stronger Passwords: Motivation and Pilot Study., , , and . PERSUASIVE, volume 5033 of Lecture Notes in Computer Science, page 140-150. Springer, (2008)CASE-FX: feature modeling support in an OO Case tool., , and . OOPSLA Companion, page 803-804. ACM, (2007)Input precision for gaze-based graphical passwords., , and . CHI Extended Abstracts, page 4279-4284. ACM, (2010)Building the security behavior observatory: an infrastructure for long-term monitoring of client machines., , , , , and . HotSoS, page 24. ACM, (2014)Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes., , , , , , , , and . SOUPS, page 97-111. USENIX Association, (2016)