1. Why and how to perform fraud experiments;M Jakobsson;IEEE Security and Privacy,2008
2. A user study design for comparing the security of registration protocols;C Karlof;Proceedings of the First USENIX Workshop on Usability, Psychology, and Security,2008
3. Perspective: Copyright lobbyists strike again;D Mccullagh;CNET News,2005