Author of the publication

User Identification Using Games.

, and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 3-14. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hodges, Duncan
add a person with the name Hodges, Duncan
 

Other publications of authors with the same name

Reconstructing What You Said: Text Inference Using Smartphone Motion., and . IEEE Trans. Mob. Comput., 18 (4): 947-959 (2019)User Identification Using Games., and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 3-14. Springer, (2016)Pathways to identity: using visualization to aid law enforcement in identification tasks., , , , , , and . Security Informatics, 3 (1): 12 (2014)Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords., , , and . Cyberpsy., Behavior, and Soc. Networking, 18 (1): 3-7 (2015)Keystroke Inference Using Smartphone Kinematics., , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 226-238. Springer, (2017)Breaking the Arc: Risk control for Big Data., and . BigData, page 613-621. IEEE Computer Society, (2013)Utility evaluation of models., , , , , and . BELIV, page 160-167. ACM, (2014)What does your profile really say about you?: privacy warning systems and self-disclosure in online social network spaces., , and . CHI Extended Abstracts, page 799-804. ACM, (2013)Predicting Graphical Passwords., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 23-35. Springer, (2015)Relationships between Password Choices, Perceptions of Risk and Security Expertise., , , and . HCI (27), volume 8030 of Lecture Notes in Computer Science, page 80-89. Springer, (2013)