Gathering evidence: use of visual security cues in web browsers T Whalen, KM Inkpen Proceedings of Graphics Interface 2005, 137-144, 2005 | 223 | 2005 |
Direct intentions: The effects of input devices on collaboration around a tabletop display V Ha, KM Inkpen, RL Mandryk, T Whalen First IEEE International Workshop on Horizontal Interactive Human-Computer …, 2006 | 127 | 2006 |
Browser interfaces and extended validation SSL certificates: an empirical study R Biddle, PC Van Oorschot, AS Patrick, J Sobey, T Whalen Proceedings of the 2009 ACM workshop on Cloud computing security, 19-30, 2009 | 114 | 2009 |
The proximity factor: impact of distance on co-located collaboration K Hawkey, M Kellar, D Reilly, T Whalen, KM Inkpen Proceedings of the 2005 ACM International Conference on Supporting Group …, 2005 | 101 | 2005 |
Exploring display factors that influence co-located collaboration: angle, size, number, and user arrangement K Inkpen, K Hawkey, M Kellar, R Mandryk, K Parker, D Reilly, S Scott, ... Proc. HCI international 2005, 2005 | 90 | 2005 |
User experiences with sharing and access control T Whalen, D Smetters, EF Churchill CHI'06 extended abstracts on Human factors in computing systems, 1517-1522, 2006 | 73 | 2006 |
Playing well with others: Applying board game design to tabletop display interfaces T Whalen ACM symposium on user interface software and technology 5, 2003 | 69 | 2003 |
User study, analysis, and usable security of passwords based on digital objects R Biddle, M Mannan, PC van Oorschot, T Whalen IEEE Transactions on Information Forensics and Security 6 (3), 970-979, 2011 | 50 | 2011 |
It's a jungle out there: practical considerations for evaluation in the city M Kellar, D Reilly, K Hawkey, M Rodgers, B MacKay, D Dearman, V Ha, ... CHI'05 extended abstracts on Human factors in computing systems, 1533-1536, 2005 | 38 | 2005 |
Might I get pwned: A second generation compromised credential checking service B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ... 31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022 | 27 | 2022 |
Information displays for managing shared files T Whalen, EG Toms, J Blustein Proceedings of the 2nd ACM Symposium on Computer Human Interaction for …, 2008 | 27 | 2008 |
A psychological profile of defender personality traits. T Whalen, C Gates J. Comput. 2 (2), 84-93, 2007 | 20 | 2007 |
Bridging the gap between privacy by design and privacy in practice L Stark, J King, X Page, A Lampinen, J Vitak, P Wisniewski, T Whalen, ... Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors …, 2016 | 16 | 2016 |
File sharing and group information management T Whalen, E Toms, J Blustein Personal Information Management: PIM 2008, 2008 | 16 | 2008 |
Profiling the defenders C Gates, T Whalen Proceedings of the 2004 workshop on New security paradigms, 107-114, 2004 | 12 | 2004 |
Adaptive groupware for wireless networks T Whalen, JP Black Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999 | 11 | 1999 |
The usable security of passwords based on digital objects: From design and analysis to user study M Mannan, T Whalen, R Biddle, PC Van Oorschot School of Computer Science, Carleton University, Tech. Rep. TR-10-02, 2010 | 10 | 2010 |
Network Mapping Tool for Real-Time Security Analysis F Massicotte, T Whalen, C Bilodeau Proceeding of NATO/RTO Information Systems Technology Panel Symposium on …, 2002 | 10 | 2002 |
ssmail: Opportunistic Encryption in sendmail. D Bentley, GG Rose, T Whalen LISA, 1-8, 1999 | 10 | 1999 |
Let The Right One In: Attestation as a Usable {CAPTCHA} Alternative T Whalen, T Meunier, M Kodali, A Davidson, M Fayed, A Faz-Hernández, ... Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 599-612, 2022 | 9 | 2022 |