关注
Sanchari Das
标题
引用次数
引用次数
年份
Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key
S Das, A Dingman, LJ Camp
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
1362018
Evaluating user perception of multi-factor authentication: a systematic review
S Das, B Wang, Z Tingle, LJ Camp
arXiv preprint arXiv:1908.05901, 2019
742019
All about phishing: Exploring user research through a systematic literature review
S Das, A Kim, Z Tingle, C Nippert-Eng
arXiv preprint arXiv:1908.05897, 2019
592019
A qualitative study on usability and acceptability of yubico security key
S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
482018
Evaluating the impact of covid-19 on cyberbullying through bayesian trend analysis
S Karmakar, S Das
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020
422020
Change-point analysis of cyberbullying-related twitter discussions during covid-19
S Das, A Kim, S Karmakar
arXiv preprint arXiv:2008.13613, 2020
392020
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review
N Noah, S Das
Computer Animation and Virtual Worlds 32 (3-4), e2020, 2021
352021
Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation
S Karmakar, S Das
Proceedings of the 54th Hawaii international conference on system sciences, 2021
332021
Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content
S Das, B Wang, LJ Camp
arXiv preprint arXiv:1908.05902, 2019
332019
Exploring gender biases in ML and AI academic research through systematic literature review
S Shrestha, S Das
Frontiers in artificial intelligence 5, 976838, 2022
322022
Evaluating user susceptibility to phishing attacks
S Das, C Nippert-Eng, LJ Camp
Information & Computer Security 30 (1), 1-18, 2022
312022
Towards implementing inclusive authentication technologies for older adults
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Who Are You, 2019
302019
A literature review on virtual reality authentication
JM Jones, R Duezguen, P Mayer, M Volkamer, S Das
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
262021
User-centered risk communication for safer browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
232020
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
212020
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
212020
Why Don’t Older Adults Adopt Two-Factor Authentication?
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the …, 2020
202020
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
J Dev, S Das, LJ Camp
HAISA, 135-146, 2018
202018
Non-inclusive online security: older adults' experience with two-factor authentication
S Das, A Kim, B Jelen, L Huber, LJ Camp
Proceedings of the 54th Hawaii International Conference on System Sciences, 2020
192020
Modularity is the key a new approach to social media privacy policies
S Das, J Dev, K Srinivasan
Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 1-4, 2018
192018
系统目前无法执行此操作,请稍后再试。
文章 1–20