Biometric authentication on a mobile device: A study of user effort, error and task disruptionShari TrewinCal Swartet al.2012ACSAC 2012Conference paper
Using automated model analysis for reasoning about security of web protocolsApurva Kumar2012ACSAC 2012Conference paper