Author of the publication

Make mine a quadruple: Strengthening the security of graphical one-time PIN authentication.

, , , and . NSS, page 81-88. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security as organizational power: A framework for re-thinking security policies., and . STAST, page 9-16. IEEE, (2011)The mechanics of trust: A framework for research and design., , and . Int. J. Hum.-Comput. Stud., 62 (3): 381-422 (2005)It Ain't What You Charge, It's The Way That You Do It: A User Perspective of Network QoS and Pricing., and . Integrated Network Management, page 639-654. IEEE, (1999)Desperately seeking assurances: Segmenting users by their information-seeking preferences., and . PST, page 102-111. IEEE, (2014)When did my mobile turn into a 'sellphone'?: a study of consumer responses to tailored smartphone ads., , , and . BCS HCI, page 215-220. British Computer Society, (2012)Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: A User Experience of Biometric Airport Systems.. IEEE Security & Privacy, 5 (3): 78-81 (2007)Protecting You., and . IEEE Security & Privacy, 12 (1): 11-13 (2014)To catch a thief - you need at least 8 frames per second: the impact of frame rates on user performance in a CCTV detection task., and . ACM Multimedia, page 941-944. ACM, (2008)Examining Users' Repertoire of Internet Applications., , , and . INTERACT, page 654-660. IOS Press, (1999)Successful Multiparty Audio Communication over the Internet., , and . Commun. ACM, 41 (5): 74-80 (1998)