From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing Password Policies for Strength and Usability., , , , , , , , , и . ACM Trans. Inf. Syst. Secur., 18 (4): 13:1-13:34 (2016)"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics., , , , , и . Proc. Priv. Enhancing Technol., 2021 (2): 282-304 (2021)OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers., , , , , , , , и . Proc. Priv. Enhancing Technol., 2022 (1): 227-252 (2022)Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors., , , и . STM, том 7783 из Lecture Notes in Computer Science, стр. 17-32. Springer, (2012)Efficient Proving for Practical Distributed Access-Control Systems., , и . ESORICS, том 4734 из Lecture Notes in Computer Science, стр. 19-37. Springer, (2007)Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , и . USENIX Security Symposium, стр. 463-481. USENIX Association, (2015)Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition., , , и . CoRR, (2018)Toward strong, usable access control for shared distributed data., , , , , , , и . FAST, стр. 89-103. USENIX, (2014)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , и . CHI, стр. 2903-2912. ACM, (2015)Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks., , , , и . ICML, том 162 из Proceedings of Machine Learning Research, стр. 13405-13430. PMLR, (2022)