Author of the publication

Stop questioning me!: towards optimizing user involvement during data collection on mobile devices.

, , , and . Mobile HCI, page 588-593. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 126-143. Springer, (2013)Securely Available Credentials (SACRED) - Credential Server Framework., , and . RFC, (April 2004)Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis., , , and . CoRR, (2019)Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking., , , , and . MobileHCI, page 284-294. ACM, (2015)Some Timestamping Protocol Failures.. NDSS, The Internet Society, (1998)Key Agreement.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Needham-Schroeder Protocols.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015., , , , , and . CoRR, (2015)Needham-Schroeder Protocols.. Encyclopedia of Cryptography and Security, Springer, (2005)Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks., , and . ADHOC-NOW, volume 2865 of Lecture Notes in Computer Science, page 151-163. Springer, (2003)