Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Minimizing Security Risks in Ubicomp Systems.. IEEE Computer, 38 (12): 118-119 (2005)Phinding Phish: An Evaluation of Anti-Phishing Toolbars., , , and . NDSS, The Internet Society, (2007)Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps., , , , , , , and . IMWUT, 2 (4): 173:1-173:27 (2018)Guest Editors' Introduction: Security & Privacy., , and . IEEE Pervasive Computing, 6 (4): 15-17 (2007)Getting users to pay attention to anti-phishing education: evaluation of retention and transfer., , , , , , and . eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, page 70-81. ACM, (2007)"Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage., , , and . Conference on Designing Interactive Systems, page 857-868. ACM, (2018)Epistenet: facilitating programmatic access & processing of semantically related mobile personal data., , and . MobileHCI, page 244-253. ACM, (2016)SATIN: a toolkit for informal ink-based applications., and . SIGGRAPH Courses, page 12. ACM, (2007)GRAPHITE: A Visual Query System for Large Graphs., , , , , and . ICDM Workshops, page 963-966. IEEE Computer Society, (2008)QuiltView: a crowd-sourced video response system., , , , , , , , and . HotMobile, page 13:1-13:6. ACM, (2014)