Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diversify to Survive: Making Passwords Stronger with Adaptive Policies., , , , , , , , , and . SOUPS, page 1-12. USENIX Association, (2017)"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab., , , , , , , and . SOUPS, page 123-140. USENIX Association, (2015)Automatically Detecting Vulnerable Websites Before They Turn Malicious., and . USENIX Security Symposium, page 625-640. USENIX Association, (2014)Use Your Illusion: secure authentication usable anywhere., , , and . SOUPS, page 35-45. ACM, (2008)Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You., , , , and . WEIS, (2015)Adaptive Regret Minimization in Bounded-Memory Games, , , and . CoRR, (2011)A Public Comment on NCCoE's White Paper on Privacy-Enhancing Identity Brokers., , and . CoRR, (2016)Exploring Usable Security to Improve the Impact of Formal Verification: A Research Agenda., , , and . AppFM@FM, volume 349 of EPTCS, page 77-84. (2021)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , and . CCS, page 3399-3401. ACM, (2022)Should Credit Card Issuers Reissue Cards in Response to a Data Breach?: Uncertainty and Transparency in Metrics for Data Security Policymaking., , and . ACM Trans. Internet Techn., 18 (4): 54:1-54:19 (2018)