From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pico Without Public Keys., , , , , , и . Security Protocols Workshop, том 9379 из Lecture Notes in Computer Science, стр. 195-211. Springer, (2015)Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens., , , , и . CoRR, (2016)Bootstrapping Adoption of the Pico Password Replacement System., , , , , и . Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 172-186. Springer, (2014)I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes., , , и . Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 197-215. Springer, (2014)Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion).. Security Protocols Workshop, том 8809 из Lecture Notes in Computer Science, стр. 216-220. Springer, (2014)Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers., , , и . PASSWORDS, том 9393 из Lecture Notes in Computer Science, стр. 61-73. Springer, (2014)AQUADA GUI: A graphical user interface for automated quantification of damages in composite structures under fatigue loading using computer vision and thermography., , и . SoftwareX, (мая 2023)To have and have not: variations on secret sharing to model user presence., , , , , и . UbiComp Adjunct, стр. 1313-1320. ACM, (2014)