Cited By
View all- Marky KSchmitz MZimmermann VHerbers MKunze KMühlhäuser MBernhaupt RMueller FVerweij DAndres JMcGrenere JCockburn AAvellino IGoguey ABjørn PZhao SSamson BKocielnik R(2020)3D-Auth: Two-Factor Authentication with Personalized 3D-Printed ItemsProceedings of the 2020 CHI Conference on Human Factors in Computing Systems10.1145/3313831.3376189(1-12)Online publication date: 21-Apr-2020
- Lu THung WCheng CWu M(2018)Develop the Ideal Profile of Business Typology and Mobile Commerce StrategyProceedings of the 2nd International Conference on Business and Information Management10.1145/3278252.3278289(79-84)Online publication date: 20-Sep-2018
- Ahmad NRextin AKulsoom U(2018)Perspectives on usability guidelines for smartphone applicationsInformation and Software Technology10.1016/j.infsof.2017.10.00594:C(130-149)Online publication date: 1-Feb-2018
- Show More Cited By