Author of the publication

Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.

, , , , , and . ACSAC, page 249-262. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review of data governance challenges in smart farming and potential solutions., and . ISTAS, page 1-8. IEEE, (2021)Sentiment Classification of Short Texts - Movie Review Case Study., , and . IEA/AIE, volume 10868 of Lecture Notes in Computer Science, page 751-761. Springer, (2018)A Review of Social Media Data Utilization for the Prediction of Disease Outbreaks and Understanding Public Perception., , , , and . Big Data Cogn. Comput., 7 (2): 72 (2023)Empowering users through privacy management recommender systems., and . IHTC, page 1-5. IEEE, (2014)Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond., , , , , and . ACSAC, page 249-262. ACM, (2020)A Practical Ontology-driven Workflow Composition Framework., , and . KEOD, page 242-248. SciTePress, (2011)Recommender Systems for Privacy Management: A Framework., and . HASE, page 243-244. IEEE Computer Society, (2014)Is the Internet of Things a helpful employee? An exploratory study of discourses of Canadian farmers., , and . Internet Things, (2022)A survey of machine learning-based solutions to protect privacy in the Internet of Things., , and . Comput. Secur., (2020)Automated generation of privacy policy using deep models., and . ISTAS, page 1-6. IEEE, (2021)