Author of the publication

Might I Get Pwned: A Second Generation Compromised Credential Checking Service.

, , , , , , , , and . USENIX Security Symposium, page 1831-1848. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Might I Get Pwned: A Second Generation Compromised Credential Checking Service., , , , , , , , and . USENIX Security Symposium, page 1831-1848. USENIX Association, (2022)Profiling the defenders., and . NSPW, page 107-114. ACM, (2004)Direct Intentions: The Effects of Input Devices on Collaboration around a Tabletop Display., , , and . Tabletop, page 177-184. IEEE Computer Society, (2006)Adaptive Groupware for Wireless Networks., and . WMCSA, page 20-. IEEE Computer Society, (1999)Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees., and . HAISA, page 25-35. University of Plymouth, (2009)Information displays for managing shared files., , and . CHIMIT, page 5. ACM, (2008)Gathering evidence: use of visual security cues in web browsers., and . Graphics Interface, page 137-144. Canadian Human-Computer Communications Society, (2005)Bridging the Gap between Privacy by Design and Privacy in Practice., , , , , , , and . CHI Extended Abstracts, page 3415-3422. ACM, (2016)Defender Personality Traits., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 85-90. Springer, (2006)User experiences with sharing and access control., , and . CHI Extended Abstracts, page 1517-1522. ACM, (2006)