From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementing Multiple Channels over SSL., , и . ICETE (2), стр. 246-256. INSTICC Press, (2004)Open Problems in Web 2.0 User Content Sharing., и . iNetSeC, том 309 из IFIP Advances in Information and Communication Technology, стр. 37-51. Springer, (2009)Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , и . USENIX Security Symposium, стр. 499-514. USENIX Association, (2015)Forecasting Suspicious Account Activity at Large-Scale Online Service Providers., , , , и . CoRR, (2018)Investigating Users' Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model., , , , , и . ACM Trans. Internet Techn., 13 (1): 2:1-2:35 (2013)Do windows users follow the principle of least privilege?: investigating user account control practices., , и . SOUPS, том 485 из ACM International Conference Proceeding Series, ACM, (2010)OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle., , и . Digital Identity Management, стр. 49-58. ACM, (2010)Efficient Authentication and Key Management Mechanisms for Smart Grid Communications., , , и . IEEE Syst. J., 8 (2): 629-640 (2014)It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls., , , , и . SafeConfig, стр. 53-62. ACM, (2010)Preparation, detection, and analysis: the diagnostic work of IT security incident response., , , и . Inf. Manag. Comput. Secur., 18 (1): 26-42 (2010)