Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What matters to users?: factors that affect users' willingness to share information with online advertisers., , , , , , , , and . SOUPS, page 7:1-7:12. ACM, (2013)Exploring reactive access control., , , , , and . CHI, page 2085-2094. ACM, (2011)Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising., , , , , and . CHI, page 589-598. ACM, (2012)Designing Password Policies for Strength and Usability., , , , , , , , , and . ACM Trans. Inf. Syst. Secur., 18 (4): 13:1-13:34 (2016)Password policy simulation and analysis., , and . Digital Identity Management, page 1-10. ACM, (2007)Don't Even Ask: Database Access Control through Query Control., , , , , and . SIGMOD Record, 47 (3): 17-22 (2018)Telepathwords: Preventing Weak Passwords by Reading Users' Minds., , , , and . USENIX Security Symposium, page 591-606. USENIX Association, (2014)Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , and . USENIX Security Symposium, page 463-481. USENIX Association, (2015)"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking., , , and . CHI, page 2657-2666. ACM, (2014)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , and . CHI, page 2903-2912. ACM, (2015)