Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)Lessons from a real world evaluation of anti-phishing training., , , , and . eCrime, page 1-12. IEEE, (2008)An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites., , , , , , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 65-80. USENIX Association, (2012)Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It., , , , and . SOUPS, page 105-111. USENIX Association, (2014)Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords., , , and . CoRR, (2014)Privacy patterns for online interactions, , , , and . Proceedings of the 2006 conference on Pattern languages of programs, page 1--9. Portland, Oregon, ACM, (2006)Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy?. Comput. Networks, 30 (1-7): 751-753 (1998)A Survey to Guide Group Key Protocol Development., , , , and . ACSAC, page 475-484. IEEE Computer Society, (2008)The architecture of robust publishing systems., , and . ACM Trans. Internet Techn., 1 (2): 199-230 (2001)