Author of the publication

Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them

. privately published, (January 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them. privately published, (January 2013)Using path profiles to predict HTTP requests, , and . Computer Networks and ISDN Systems, 30 (1): 457 - 467 (1998)It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions., , and . SP, page 375-390. IEEE Computer Society, (2009)How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks., and . Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, page 122-137. Springer, (2003)Telepathwords: Preventing Weak Passwords by Reading Users' Minds., , , , and . USENIX Security Symposium, page 591-606. USENIX Association, (2014)Access for sale: a new class of worm., and . WORM, page 19-23. ACM Press, (2003)1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication., and . SOUPS, ACM, (2009)StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing., , and . IEEE Secur. Priv., 18 (3): 38-47 (2020)Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices.. HealthSec, USENIX Association, (2010)The Emperor's New Security Indicators., , , and . S&P, page 51-65. IEEE Computer Society, (2007)