Author of the publication

Fingerprint self-captures: Usability of a fingerprint system with real-time feedback.

, , and . BTAS, page 16-22. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Basing Cybersecurity Training on User Perceptions., , , and . IEEE Security & Privacy, 10 (2): 40-49 (2012)A methodology for penetration testing., , and . Computers & Security, 8 (7): 613-620 (1989)Bridging the gap: between accessibility and usability., and . Interactions, 10 (6): 36-51 (2003)Development of a Scale to Assess the Linguistic and Phonological Difficulty of Passwords., , , , , , and . HCI (19), volume 8528 of Lecture Notes in Computer Science, page 131-139. Springer, (2014)Wavefront: a goal-driven requirements process model., and . Information & Software Technology, 38 (8): 507-519 (1996)Clear, Unambiguous Password Policies: An Oxymoron?, , and . HCI (19), volume 8528 of Lecture Notes in Computer Science, page 240-251. Springer, (2014)Development of a test bed for evaluating human-robot performance for explosive ordnance disposal robots., , and . HRI, page 10-17. ACM, (2006)"Passwords protect my stuff" - a study of children's password practices., , , and . J. Cybersecurity, 5 (1): tyz015 (2019)How the subject can improve fingerprint image quality., , , , and . J. Electronic Imaging, 17 (1): 011007 (2008)Guest Editors' Introduction: Shouldn't All Security Be Usable?, and . IEEE Security & Privacy, 9 (2): 12-17 (2011)