From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Are HTTPS Configurations Still a Challenge?: Validating Theories of Administrators' Difficulties with TLS Configurations., , , и . HCI (32), том 13333 из Lecture Notes in Computer Science, стр. 173-193. Springer, (2022)User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach., , , , и . SOUPS @ USENIX Security Symposium, стр. 341-358. USENIX Association, (2020)Expert Mental Models of SSI Systems and Implications for End-User Understanding.. IACR Cryptol. ePrint Arch., (2022)On the Usability of Authenticity Checks for Hardware Security Tokens., , , , , , , и . USENIX Security Symposium, стр. 37-54. USENIX Association, (2021)Mental Models of the Internet and Its Online Risks: Children and Their Parent(s)., , , , и . HCI (32), том 13333 из Lecture Notes in Computer Science, стр. 42-61. Springer, (2022)A Fixed-Point Algorithm for Automated Static Detection of Infinite Loops., и . HASE, стр. 44-51. IEEE Computer Society, (2015)Better Keep Cash in Your Boots - Hardware Wallets are the New Single Point of Failure., , , , , и . DeFi@CCS, стр. 1-8. ACM, (2021)Replication: Stories as Informal Lessons about Security., , , , и . SOUPS @ USENIX Security Symposium, стр. 1-18. USENIX Association, (2022)