Author of the publication

Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices.

, , , and . Int. J. Mob. Hum. Comput. Interact., 6 (2): 73-78 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovering High-Value Secrets with SGX and Social Authentication., , and . WAY@SOUPS, USENIX Association, (2016)Disaster privacy/privacy disaster., , , , and . J. Assoc. Inf. Sci. Technol., 71 (9): 1002-1014 (2020)Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices., , , and . Int. J. Mob. Hum. Comput. Interact., 6 (2): 73-78 (2014)Fingerprinting Web Users Through Font Metrics., and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 107-124. Springer, (2015)Choice Architecture and Smartphone Privacy: There's a Price for That., , and . WEIS, (2012)Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)Dynamically Regulating Mobile Application Permissions., , , , , , and . IEEE Secur. Priv., 16 (1): 64-71 (2018)It's not what you know, but who you know: a social approach to last-resort authentication., , and . CHI, page 1983-1992. ACM, (2009)Timing is everything?: the effects of timing and placement of online privacy indicators., , , and . CHI, page 319-328. ACM, (2009)Does my password go up to eleven?: the impact of password meters on password selection., , , , and . CHI, page 2379-2388. ACM, (2013)