Author of the publication

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.

, , , and . NDSS, The Internet Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Study of Face Authentication Systems Under OSNFD Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 231-245 (2018)A text analytics framework for understanding the relationships among host self-description, trust perception and purchase behavior on Airbnb., , and . Decis. Support Syst., (2020)A computational framework for understanding antecedents of guests' perceived trust towards hosts on Airbnb., , and . Decis. Support Syst., (2018)Study on the influencing factors of unplanned consumption in a large online promotion activity., , , and . Electron. Commer. Res., 16 (4): 453-477 (2016)Leakage Resilient Password Systems, , and . Springer Briefs in Computer Science Springer, (2015)Pulmonary nodule diagnosis using dual-modal supervised autoencoder based on extreme learning machine., , , , and . Expert Syst. J. Knowl. Eng., (2017)DVREI: Dynamic Verifiable Retrieval Over Encrypted Images., , , , , , , and . IEEE Trans. Computers, 71 (8): 1755-1769 (2022)Metabolic characterization of the chitinolytic bacterium Serratia marcescens using a genome-scale metabolic model., , , and . BMC Bioinform., 20 (1): 227:1-227:13 (2019)Leveraging online behaviors for interpretable knowledge-aware patent recommendation., , , and . Internet Res., 32 (2): 568-587 (2022)Two-stream vision transformer based multi-label recognition for TCM prescriptions construction., , , , , and . Comput. Biol. Medicine, (March 2024)