Author of the publication

A User Study Design for Comparing the Security of Registration Protocols.

, , and . UPSEC, USENIX Association, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The battle against phishing: Dynamic Security Skins., and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 77-88. ACM, (2005)On Modeling the Costs of Censorship., , , and . CoRR, (2014)CITRIC: A low-bandwidth wireless camera network platform., , , , , , , , , and 5 other author(s). ICDSC, page 1-10. IEEE, (2008)Characterizing Botnets from Email Spam Records., , , , , and . LEET, USENIX Association, (2008)SWOON: A Testbed for Secure Wireless Overlay Networks., , , , , , , , , and 6 other author(s). CSET, USENIX Association, (2008)Token and Notational Money in Electronic Commerce., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1995)Cyber defense technology networking and evaluation., , , , , , , , , and 14 other author(s). Commun. ACM, 47 (3): 58-61 (2004)Security Analytics in the Context of Adversarial Machine Learning.. IWSPA@CODASPY, page 49. ACM, (2016)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 394-395. Springer, (2008)The Impact of Procedural Security Countermeasures on Employee Security Behaviour: A Qualitative Study., , and . ISD, Association for Information Systems, (2017)