From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Who Are You Now? Fading to Multiple Personas., , и . WAY@SOUPS, USENIX Association, (2016)Shape Evasion: Preventing Body Shape Inference of Multi-Stage Approaches., , , и . CoRR, (2019)End User and Expert Perceptions of Threats and Potential Countermeasures., , и . EuroS&P Workshops, стр. 230-239. IEEE, (2020)Exploring Design Directions for Wearable Privacy, , , и . (января 2017)On the Usability of Authenticity Checks for Hardware Security Tokens., , , , , , , и . USENIX Security Symposium, стр. 37-54. USENIX Association, (2021)Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms, , , и . Synthesis Lectures on Information Security, Privacy, and Trust Morgan & Claypool Publishers, (2017)QR Code Security: A Survey of Attacks and Challenges for Usable Security., , , , , и . HCI (24), том 8533 из Lecture Notes in Computer Science, стр. 79-90. Springer, (2014)Smart Privacy Visor: Bridging the Privacy Gap., , , и . BIS (Workshops), том 228 из Lecture Notes in Business Information Processing, стр. 235-247. Springer, (2015)Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon., , , и . Proc. ACM Hum. Comput. Interact., 7 (CSCW2): 1-26 (2023)Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context., , , , и . USENIX Security Symposium, стр. 3433-3450. USENIX Association, (2022)