From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations., и . CoRR, (2018)SoK: I Have the (Developer) Power! Sample Size Estimation for Fisher's Exact, Chi-Squared, McNemar's, Wilcoxon Rank-Sum, Wilcoxon Signed-Rank and t-tests in Developer-Centered Usable Security., , и . SOUPS, стр. 341-359. USENIX Association, (2023)Adventures in Recovery Land: Testing the Account Recovery of Popular Websites When the Second Factor is Lost., , , , и . SOUPS, стр. 227-243. USENIX Association, (2023)Can Johnny be a whistleblower? A qualitative user study of a social authentication Signal extension in an adversarial scenario., , , , и . SOUPS @ USENIX Security Symposium, стр. 259-278. USENIX Association, (2024)Less About Privacy: Revisiting a Survey about the German COVID-19 Contact Tracing App., , , и . CHI, стр. 584:1-584:16. ACM, (2023)Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany., , , , , , и . SOUPS @ USENIX Security Symposium, стр. 77-98. USENIX Association, (2021)Evolution of Password Expiry in Companies: Measuring the Adoption of Recommendations by the German Federal Office for Information Security., , , и . SOUPS, стр. 191-210. USENIX Association, (2023)