Author of the publication

Stronger Password Authentication Using Browser Extensions.

, , , , and . USENIX Security Symposium, USENIX Association, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametricity and Variants of Girard's J Operator., and . Inf. Process. Lett., 70 (1): 1-5 (1999)Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 133-149. Springer, (2011)Inductive Proofs of Computational Secrecy., , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 219-234. Springer, (2007)A Layered Architecture for Detecting Malicious Behaviors., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 78-97. Springer, (2008)Evaluating the privacy properties of telephone metadata., , and . Proc. Natl. Acad. Sci. USA, 113 (20): 5536-5541 (2016)A Compositional Logic for Proving Security Properties of Protocols., , and . J. Comput. Secur., 11 (4): 677-722 (2003)Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods., and . WOOT, USENIX Association, (2008)The Development of Type Systems for Object-Oriented Languages., and . Theory Pract. Object Syst., 1 (3): 189-220 (1995)A modular correctness proof of IEEE 802.11i and TLS., , , , and . CCS, page 2-15. ACM, (2005)On Abstraction and the Expressive Power of Programming Languages.. Sci. Comput. Program., 21 (2): 141-163 (1993)