Author of the publication

Investigating the work practices of network security professionals.

, , , and . Inf. & Comput. Security, 23 (3): 347-367 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis., , , and . CoRR, (2019)Securely Available Credentials (SACRED) - Credential Server Framework., , and . RFC, (April 2004)"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks., and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 126-143. Springer, (2013)Why aren't Users Using Protection? Investigating the Usability of Smartphone Locking., , , , and . MobileHCI, page 284-294. ACM, (2015)Challenge-Response Identification.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Diffie-Hellman Key Agreement.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)PKI Trust Models.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Experimental large-scale review of attractors for detection of potentially unwanted applications., , , , , and . Computers & Security, (2018)Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation., , and . Adv. Software Engineering, (2016)Everything's Cool: Extending Security Warnings with Thermal Feedback., , and . CHI Extended Abstracts, page 2232-2239. ACM, (2017)