Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking influence through citation index comparisons and preliminary case studies panel position statement.. NSPW, page 115-117. ACM, (2001)Developer-centered security and the symmetry of ignorance., , and . NSPW, page 46-56. ACM, (2017)User-Centered Security.. NDSS, The Internet Society, (1999)Performance Considerations in Web Security., , and . Certification and Security in E-Services, volume 255 of IFIP Conference Proceedings, page 57-71. Kluwer, (2002)Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231)., , , and . Dagstuhl Reports, 9 (6): 1-25 (2019)Separation of Duties., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Jonah: Experience Implementing PKIX Reference Freeware., , , , , , , , , and 1 other author(s). USENIX Security Symposium, USENIX Association, (1999)Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision., , , and . ACSAC, page 371-381. IEEE Computer Society, (2002)User-centered security., and . NSPW, page 27-33. ACM, (1996)Someone to watch over me., and . NSPW, page 67-76. ACM, (2012)