Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing password composition policies., , , and . EC, page 105-122. ACM, (2013)The post anachronism: the temporal dimension of facebook privacy., , , , , , and . WPES, page 1-12. ACM, (2013)Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords., , , and . NDSS, The Internet Society, (2015)Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks., , , , , and . USENIX Annual Technical Conference, USENIX Association, (2017)Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , and . USENIX Security Symposium, page 463-481. USENIX Association, (2015)Telepathwords: Preventing Weak Passwords by Reading Users' Minds., , , , and . USENIX Security Symposium, page 591-606. USENIX Association, (2014)"I regretted the minute I pressed share": a qualitative study of regrets on Facebook., , , , , and . SOUPS, page 10. ACM, (2011)Designing Password Policies for Strength and Usability., , , , , , , , , and . ACM Trans. Inf. Syst. Secur., 18 (4): 13:1-13:34 (2016)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , and . CHI, page 2903-2912. ACM, (2015)Helping Users Create Better Passwords., , , , , , , , , and 4 other author(s). login Usenix Mag., (2012)