Author of the publication

The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets.

, , , , and . CHI, page 642:1-642:14. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The U in Crypto Stands for Usable: An Empirical Study of User Experience with Mobile Cryptocurrency Wallets., , , , and . CHI, page 642:1-642:14. ACM, (2021)On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities., , , , , and . Cybersecur., 5 (1): 16 (2022)Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones., , , and . USENIX Security Symposium, page 917-935. USENIX Association, (2022)Is Implicit Authentication on Smartphones Really Popular? On Android Users' Perception of "Smart Lock for Android"., , , and . MobileHCI, page 20:1-20:17. ACM, (2020)Trust, Privacy, and Safety Factors Associated with Decision Making in P2P Markets Based on Social Networks: A Case Study of Facebook Marketplace in USA and Canada., , , , , and . CHI, page 948:1-948:25. ACM, (2024)On Smartphone Users' Difficulty with Understanding Implicit Authentication., , , and . CHI, page 690:1-690:14. ACM, (2021)On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities., , , , , and . CoRR, (2023)Maximizing Quality of Aggregation in WSNs under Deadline and Interference Constraints., , , and . SECON, page 118-126. IEEE, (2018)