Timothy W. van der Horst

According to our database1, Timothy W. van der Horst authored at least 9 papers between 2004 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Confused Johnny: when automatic encryption leads to confusion and mistakes.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Private Facebook Chat.
Proceedings of the 2012 International Conference on Privacy, 2012

2008
CPG: closed pseudonymous groups.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Wireless authentication using remote passwords.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

pwdArmor: Protecting Conventional Password-Based Authentications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Simple authentication for the web.
Proceedings of the 16th International Conference on World Wide Web, 2007

2006
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Short Paper: Thor - The Hybrid Online Repository.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks.
Proceedings of the Communications and Multimedia Security, 2004


  Loading...