Author of the publication

Usability Improvements for WLAN Access.

, and . HCI (1), volume 4550 of Lecture Notes in Computer Science, page 549-558. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Karvonen, Kristiina
add a person with the name Karvonen, Kristiina
 

Other publications of authors with the same name

Usable security management with host identity protocol., , and . AICCSA, page 279-286. IEEE Computer Society, (2009)Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing., , , , and . IEEE NAS, page 122-132. IEEE Computer Society, (2007)Usability Analysis of Secure Pairing Methods., , and . Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 307-324. Springer, (2007)Secure and usable P2P VoIP for mobile devices., , , and . Mobile HCI, page 439-442. ACM, (2010)Users and Trust: The New Threats, the New Possibilities.. HCI (7), volume 4556 of Lecture Notes in Computer Science, page 893-902. Springer, (2007)WidSets: A Usability Study of Widget Sharing., , and . INTERACT (2), volume 5727 of Lecture Notes in Computer Science, page 461-464. Springer, (2009)Designing trust for a universal audience: a multicultural study on the formation of trust in the Internet in the Nordic Countries.. HCI, page 1078-1082. Lawrence Erlbaum, (2001)Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance., , , , and . Cyberpsy., Behavior, and Soc. Networking, 17 (10): 633-638 (2014)Creating Home Network Access for the Elderly.. HCI (5), volume 4554 of Lecture Notes in Computer Science, page 942-949. Springer, (2007)Users and Trust in Cyberspace., and . Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, page 24-35. Springer, (2000)