A tale of two studies: The best and worst of yubikey usability J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons 2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018 | 108 | 2018 |
Empirical Measurement of Systemic {2FA} Usability J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman 29th USENIX Security Symposium (USENIX Security 20), 127-143, 2020 | 44 | 2020 |
{TrustBase}: An architecture to repair and strengthen certificate-based authentication M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ... 26th USENIX Security Symposium (USENIX Security 17), 609-624, 2017 | 32 | 2017 |
Measuring identity confusion with uniform resource locators J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ... Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 29 | 2020 |
The impact of secure transport protocols on phishing efficacy Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ... 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 11 | 2019 |
A Usability Study of Secure Email Deletion T Monson, S Ruoti, J Reynolds, D Zappala, T Smith, K Seamons European Workshop on Usable Security, 2018 | 7 | 2018 |
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations J Reynolds, A Bates, M Bailey European Symposium on Research in Computer Security, 166-185, 2022 | 5 | 2022 |
URL location ambiguity J Reynolds University of Illinois at Urbana-Champaign, 2022 | | 2022 |