Author of the publication

Fashion crimes: trending-term exploitation on the web.

, , and . ACM Conference on Computer and Communications Security, page 455-466. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use Your Illusion: secure authentication usable anywhere., , , and . SOUPS, page 35-45. ACM, (2008)A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers., , and . CoRR, (2016)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , and . CCS, page 3399-3401. ACM, (2022)Where are you taking me?Understanding Abusive Traffic Distribution Systems., , , , and . WWW, page 3613-3624. ACM / IW3C2, (2021)Secure or insure?: a game-theoretic analysis of information security games., , and . WWW, page 209-218. ACM, (2008)Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You., , , , and . WEIS, (2015)Usability and Security of Text Passwords on Mobile Devices., , , , , , , , , and . CHI, page 527-539. ACM, (2016)Do Users' Perceptions of Password Security Match Reality?, , , , , and . CHI, page 3748-3760. ACM, (2016)Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents., , , and . GAMENETS, volume 75 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 444-458. Springer, (2011)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)