Author of the publication

How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion).

. Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 171-178. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (6): 891-904 (2014)Security Analyses of Click-based Graphical Passwords via Image Point Memorability., , , and . ACM Conference on Computer and Communications Security, page 1217-1231. ACM, (2014)Graphical passwords & qualitative spatial relations., , , and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 161-162. ACM, (2007)Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion).. Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 96-102. Springer, (2016)How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion).. Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 171-178. Springer, (2018)Towards New Security Primitives Based on Hard AI Problems., and . Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 3-10. Springer, (2013)Security Design in Human Computation Games., and . Security Protocols Workshop, volume 7061 of Lecture Notes in Computer Science, page 142-153. Springer, (2010)From Sicilian mafia to Chinese "scam villages".. CoRR, (2019)Streamlining Attacks on CAPTCHAs with a Computer Game., and . IJCAI, page 2095-2100. (2009)SoK: Acoustic Side Channels., , , , and . CoRR, (2023)