Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Query by Browsing., and . IDS, page 236-248. Springer, (1994)Ecological validity in studies of security and human behaviour.. SOUPS, ACM, (2009)Symbolic Aspects of University Homepage Design: What Appeals to Different Cultures?, , and . MMI Interakt., (2007)Ethical and Secure Data Sharing across Borders., , and . Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, page 136-140. Springer, (2012)Private Data Management in Collaborative Environments., , , , , , and . CDVE, volume 4674 of Lecture Notes in Computer Science, page 88-96. Springer, (2007)A QoE Sensitive Architecture for Advanced Collaborative Environments., , , , , , , and . QSHINE, page 319-322. IEEE Computer Society, (2004)Field Testing a Natural-Language Information System: Usage Characteristics and Users' Comments., and . Interact. Comput., 4 (2): 218-230 (1992)Browser interfaces and extended validation SSL certificates: an empirical study., , , , and . CCSW, page 19-30. ACM, (2009)Media Lessons from the National Capital FreeNet.. Commun. ACM, 40 (7): 74-80 (1997)Passwords: If We're So Smart, Why Are We Still Using Them?, , and . Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 230-237. Springer, (2009)