From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting., , , , и . NDSS, The Internet Society, (2018)Exploring reactive access control., , , , , и . CHI, стр. 2085-2094. ACM, (2011)Tag, you can see it!: using tags for access control in photo sharing., , , , , , , , и . CHI, стр. 377-386. ACM, (2012)Why people (don't) use password managers effectively., , , и . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes., , , , и . WWW, стр. 1501-1510. ACM, (2017)Modeling and Enhancing Android's Permission System., , , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2012)What matters to users?: factors that affect users' willingness to share information with online advertisers., , , , , , , , и . SOUPS, стр. 7:1-7:12. ACM, (2013)The post anachronism: the temporal dimension of facebook privacy., , , , , , и . WPES, стр. 1-12. ACM, (2013)Probabilistic Cost Enforcement of Security Policies., , , , и . STM, том 8203 из Lecture Notes in Computer Science, стр. 144-159. Springer, (2013)Device-Enabled Authorization in the Grey-System., , , , , и . ISC, том 3650 из Lecture Notes in Computer Science, стр. 431-445. Springer, (2005)