Author of the publication

Social Authentication: Harder Than It Looks.

, , and . Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 1-15. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Components in time-varying graphs, , , , , and . CoRR, (2011)Temporal network metrics and their application to real world networks.. University of Cambridge, UK, (2012)British Library, EThOS.STOP: Socio-Temporal Opportunistic Patching of short range mobile malware., , , and . WOWMOM, page 1-9. IEEE Computer Society, (2012)Graph Metrics for Temporal Networks., , , , , and . CoRR, (2013)Exploiting Temporal Complex Network Metrics in Mobile Malware Containment, , , and . CoRR, (2010)Exploiting temporal complex network metrics in mobile malware containment., , , and . WOWMOM, page 1-9. IEEE Computer Society, (2011)Social Authentication: Harder Than It Looks., , and . Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 1-15. Springer, (2012)Analysing information flows and key mediators through temporal centrality metrics., , , , and . SNS, page 3. ACM, (2010)Centrality prediction in dynamic human contact networks., , , and . Computer Networks, 56 (3): 983-996 (2012)Characterising temporal distance and reachability in mobile and online social networks., , , and . Computer Communication Review, 40 (1): 118-124 (2010)