Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is FacePIN secure and usable?, and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 165-166. ACM, (2007)Eighty something: banking for the older old., , , and . BCS HCI, page 64-73. ACM, (2011)Using IMUs to Identify Supervisors on Touch Devices., , , , , and . INTERACT (2), volume 9297 of Lecture Notes in Computer Science, page 565-583. Springer, (2015)Securing passfaces for description., , and . SOUPS, page 24-35. ACM, (2008)A closer look at recognition-based graphical passwords on mobile devices., , and . SOUPS, volume 485 of ACM International Conference Proceeding Series, ACM, (2010)Taking as an act of sharing., , , , , and . CSCW, page 1091-1100. ACM, (2012)The joy of cheques: trust, paper and eighty somethings., , , , , and . CSCW, page 147-156. ACM, (2012)HCI for Blockchain: Studying, Designing, Critiquing and Envisioning Distributed Ledger Technologies., , , , , , , and . CHI Extended Abstracts, ACM, (2018)Decentralizing Digital Identity: Open Challenges for Distributed Ledgers., , and . EuroS&P Workshops, page 75-78. IEEE, (2018)PosterVote: expanding the action repertoire for local political activism., , , , , , and . Conference on Designing Interactive Systems, page 795-804. ACM, (2014)