From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

What I Learned from Spending a Dozen Years in the Dark Web.. WSDM, стр. 2-3. ACM, (2024)Audit Mechanisms for Privacy Protection in Healthcare Environments., , , и . HealthSec, USENIX Association, (2011)Audit Games., , , , и . IJCAI, стр. 41-47. IJCAI/AAAI, (2013)Uncertainty in Interdependent Security Games., , , и . GameSec, том 6442 из Lecture Notes in Computer Science, стр. 234-244. Springer, (2010)Adaptive Regret Minimization in Bounded-Memory Games., , , и . GameSec, том 8252 из Lecture Notes in Computer Science, стр. 65-84. Springer, (2013)Measuring password guessability for an entire university., , , , , , , , и . CCS, стр. 173-186. ACM, (2013)The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs., , , , , , , и . Financial Cryptography Workshops, том 7862 из Lecture Notes in Computer Science, стр. 34-51. Springer, (2013)Security and insurance management in networks with heterogeneous agents., , и . EC, стр. 160-169. ACM, (2008)How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation., , , , и . Internet Measurement Conference, стр. 203-217. ACM, (2018)Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat., , , , , , , , и . CCS, стр. 295-310. ACM, (2017)