Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovering High-Value Secrets with SGX and Social Authentication., , and . WAY@SOUPS, USENIX Association, (2016)Disaster privacy/privacy disaster., , , , and . J. Assoc. Inf. Sci. Technol., 71 (9): 1002-1014 (2020)Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices., , , and . Int. J. Mob. Hum. Comput. Interact., 6 (2): 73-78 (2014)Dynamically Regulating Mobile Application Permissions., , , , , , and . IEEE Secur. Priv., 16 (1): 64-71 (2018)Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)Privacy and Security Threat Models and Mitigation Strategies of Older Adults., , , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Choice Architecture and Smartphone Privacy: There's a Price for That., , and . WEIS, (2012)You've been warned: an empirical study of the effectiveness of web browser phishing warnings., , and . CHI, page 1065-1074. ACM, (2008)Timing is everything?: the effects of timing and placement of online privacy indicators., , , and . CHI, page 319-328. ACM, (2009)It's not what you know, but who you know: a social approach to last-resort authentication., , and . CHI, page 1983-1992. ACM, (2009)