From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing password composition policies., , , и . EC, стр. 105-122. ACM, (2013)The post anachronism: the temporal dimension of facebook privacy., , , , , , и . WPES, стр. 1-12. ACM, (2013)Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords., , , и . NDSS, The Internet Society, (2015)Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks., , , , , и . USENIX Annual Technical Conference, USENIX Association, (2017)Designing Password Policies for Strength and Usability., , , , , , , , , и . ACM Trans. Inf. Syst. Secur., 18 (4): 13:1-13:34 (2016)"I regretted the minute I pressed share": a qualitative study of regrets on Facebook., , , , , и . SOUPS, стр. 10. ACM, (2011)Telepathwords: Preventing Weak Passwords by Reading Users' Minds., , , , и . USENIX Security Symposium, стр. 591-606. USENIX Association, (2014)Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , и . USENIX Security Symposium, стр. 463-481. USENIX Association, (2015)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , и . CHI, стр. 2903-2912. ACM, (2015)Order and entropy in picture passwords., и . Graphics Interface, стр. 115-122. ACM Press, (2008)