Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
- Max SpencerCambridge UniversityVerified email at cl.cam.ac.uk
- Quentin Stafford-FraserTelemarq Ltd, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
- Jeunese PayneResearch Associate, University of CambridgeVerified email at cl.cam.ac.uk
- Robert N. M. WatsonDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
- Jonathan AndersonMemorial University of NewfoundlandVerified email at mun.ca
- M. Angela Sasse ML, FREngProfessor of Human-Centred Security, Ruhr University Bochum & Prof. Human-Centred Technology, UCLVerified email at ruhr-uni-bochum.de
- Lucian CarataResearch Associate, University of CambridgeVerified email at cam.ac.uk
- Thomas BythewayUniversity of Cambridge Computer LaboratoryVerified email at cl.cam.ac.uk
- Brian KidneyPhD Candidate, Memorial UniversityVerified email at mun.ca
- Kat KrolGoogle UKVerified email at google.com
- Toshiyuki MasuiProfessor, Keio UniversityVerified email at sfc.keio.ac.jp
- Brian GlassPostdoctoral Researcher of Psychology and Computer Science, University College London, University ofVerified email at qmul.ac.uk
- Per ThorsheimPassword researcherVerified email at thorsheim.net
- S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
- Nikilesh BalakrishnanResearcher in Computer Science, University of CambridgeVerified email at cam.ac.uk