From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Influencing users towards better passwords: persuasive cued click-points., , , и . BCS HCI (1), стр. 121-130. BCS, (2008)Improving text passwords through persuasion., , , и . SOUPS, стр. 1-12. ACM, (2008)Graphical passwords: Learning from the first twelve years., , и . ACM Comput. Surv., 44 (4): 19:1-19:41 (2012)The developer is the enemy., и . NSPW, стр. 89-97. ACM, (2008)Extending Cryptographic Logics of Belief to Key Agreement Protocols.. ACM Conference on Computer and Communications Security, стр. 232-243. ACM, (1993)Design Choices and Security Implications in Implementing Diffie-Hellman Key Agreement.. IMACC, том 1025 из Lecture Notes in Computer Science, стр. 1. Springer, (1995)Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism., , , , и . IEEE Trans. Dependable Secur. Comput., 9 (2): 222-235 (2012)Baton: certificate agility for android's decentralized signing infrastructure., , , и . WISEC, стр. 1-12. ACM, (2014)Science, Security and Academic Literature: Can We Learn from History?. MTD@CCS, стр. 1-2. ACM, (2017)A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability., , , , , , , , и . AsiaCCS, стр. 195-206. ACM, (2014)