Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hand Dynamics for Behavioral User Authentication., , , and . ARES, page 389-398. IEEE Computer Society, (2016)Securing the Internet, One HTTP 200 OK at a Time., , , and . ;login:, (2017)Automated Analysis of Underground Marketplaces., , , , and . IFIP Int. Conf. Digital Forensics, volume 433 of IFIP Advances in Information and Communication Technology, page 31-42. Springer, (2014)Use the Force: Evaluating Force-Sensitive Authentication for Mobile Devices., , and . SOUPS, page 207-219. USENIX Association, (2016)Sensor Captchas: On the Usability of Instrumenting Hardware Sensors to Prove Liveliness., , and . TRUST, volume 9824 of Lecture Notes in Computer Science, page 40-59. Springer, (2016)WhiteNet: Phishing Website Detection by Visual Whitelists., , and . CoRR, (2019)"If HTTPS Were Secure, I Wouldn't Need 2FA" - End User and Administrator Mental Models of HTTPS., , , , and . IEEE Symposium on Security and Privacy, page 246-263. IEEE, (2019)A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research., , , , , , , and . ACM Trans. Comput. Hum. Interact., 28 (6): 43:1-43:50 (2021)Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations., , , and . Digit. Investig., 11 (4): 336-348 (2014)Investigating System Operators' Perspective on Security Misconfigurations., , , and . ACM Conference on Computer and Communications Security, page 1272-1289. ACM, (2018)