Author of the publication

Encountering stronger password requirements: user attitudes and behaviors.

, , , , , , , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What matters to users?: factors that affect users' willingness to share information with online advertisers., , , , , , , , and . SOUPS, page 7:1-7:12. ACM, (2013)The post anachronism: the temporal dimension of facebook privacy., , , , , , and . WPES, page 1-12. ACM, (2013)Device-Enabled Authorization in the Grey-System., , , , , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 431-445. Springer, (2005)Probabilistic Cost Enforcement of Security Policies., , , , and . STM, volume 8203 of Lecture Notes in Computer Science, page 144-159. Springer, (2013)Exploring reactive access control., , , , , and . CHI, page 2085-2094. ACM, (2011)Tag, you can see it!: using tags for access control in photo sharing., , , , , , , , and . CHI, page 377-386. ACM, (2012)Why people (don't) use password managers effectively., , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting., , , , and . NDSS, The Internet Society, (2018)Modeling and Enhancing Android's Permission System., , , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 1-18. Springer, (2012)Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes., , , , and . WWW, page 1501-1510. ACM, (2017)