Author of the publication

Mercury: Recovering Forgotten Passwords Using Personal Devices.

, , , , and . Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, page 315-330. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unicorn: two-factor attestation for data security., , , and . ACM Conference on Computer and Communications Security, page 17-28. ACM, (2011)A Large-Scale Evaluation of High-Impact Password Strength Meters., and . ACM Trans. Inf. Syst. Secur., 18 (1): 1:1-1:32 (2015)On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications., , and . ACM Trans. Priv. Secur., 27 (1): 8:1-8:37 (2024)On instant messaging worms, analysis and countermeasures., and . WORM, page 2-11. ACM Press, (2005)Lightweight Client-Side Methods for Detecting Email Forgery., , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 254-269. Springer, (2012)Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers., and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 533-541. Springer, (2017)Mobiflage: Deniable Storage Encryptionfor Mobile Devices., and . IEEE Trans. Dependable Secur. Comput., 11 (3): 224-237 (2014)Using SafeKeeper to Protect Web Passwords., , , , and . WWW (Companion Volume), page 159-162. ACM, (2018)Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps., , , and . WWW, page 564-575. ACM, (2022)Not so Immutable: Upgradeability of Smart Contracts on Ethereum., , and . Financial Cryptography Workshops, volume 13412 of Lecture Notes in Computer Science, page 539-554. Springer, (2022)