Author of the publication

The Impact of Secure Transport Protocols on Phishing Efficacy.

, , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication., , , , , , , , , and . USENIX Security Symposium, page 609-624. USENIX Association, (2017)Internationalized Back-of-the-Book Indexes for XSL Formatting Objects., and . Extreme Markup Languages®, (2002)Machine Learning Based Object Tracking., , , and . CoRR, (2024)A Tale of Two Studies: The Best and Worst of YubiKey Usability., , , , , and . IEEE Symposium on Security and Privacy, page 872-888. IEEE Computer Society, (2018)Empirical Measurement of Systemic 2FA Usability., , , , , , and . USENIX Security Symposium, page 127-143. USENIX Association, (2020)Measuring Identity Confusion with Uniform Resource Locators., , , , , , , , and . CHI, page 1-12. ACM, (2020)Using computational swarm intelligence for real-time asset allocation., , , and . CISDA, page 1-5. IEEE, (2015)The Impact of Secure Transport Protocols on Phishing Efficacy., , , , , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations., , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 166-185. Springer, (2022)Apocrita: a distributed peer-to-peer file sharing system for intranets., , and . ACM Southeast Regional Conference, page 174-178. ACM, (2007)