From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Approaches to Security in Healthcare Multimedia Systems., , , , и . Communications and Multimedia Security, том 70 из IFIP Conference Proceedings, стр. 25-36. Chapman & Hall, (1996)Advanced user authentication for mobile devices., и . Comput. Secur., 26 (2): 109-119 (2007)Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy., и . ICISSP (Revised Selected Papers), том 1851 из Communications in Computer and Information Science, стр. 48-71. Springer, (2022)Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles., и . ICISSP, стр. 426-434. SCITEPRESS, (2022)Refining the Understanding of Usable Security., , и . HCI (35), том 14045 из Lecture Notes in Computer Science, стр. 49-67. Springer, (2023)Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings., , и . HCI (35), том 14045 из Lecture Notes in Computer Science, стр. 557-575. Springer, (2023)Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers., и . HCI (27), том 8030 из Lecture Notes in Computer Science, стр. 217-225. Springer, (2013)Efficient Privacy-preserving User Identity with Purpose-based Encryption., , , и . ISNCC, стр. 1-8. IEEE, (2019)Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?, , и . Computer, 54 (3): 68-72 (2021)Authentication of users on mobile telephones - A survey of attitudes and practices., и . Comput. Secur., 24 (7): 519-527 (2005)