关注
Sanchari Das
标题
引用次数
引用次数
年份
Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key
S Das, A Dingman, LJ Camp
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
1502018
Evaluating user perception of multi-factor authentication: a systematic review
S Das, B Wang, Z Tingle, LJ Camp
arXiv preprint arXiv:1908.05901, 2019
852019
All about phishing: Exploring user research through a systematic literature review
S Das, A Kim, Z Tingle, C Nippert-Eng
arXiv preprint arXiv:1908.05897, 2019
632019
A qualitative study on usability and acceptability of yubico security key
S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
532018
Exploring gender biases in ML and AI academic research through systematic literature review
S Shrestha, S Das
Frontiers in artificial intelligence 5, 976838, 2022
522022
Change-point analysis of cyberbullying-related twitter discussions during covid-19
S Das, A Kim, S Karmakar
arXiv preprint arXiv:2008.13613, 2020
512020
Evaluating the impact of covid-19 on cyberbullying through bayesian trend analysis
S Karmakar, S Das
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020
502020
Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation
S Karmakar, S Das
Proceedings of the 54th Hawaii international conference on system sciences, 2021
422021
Evaluating user susceptibility to phishing attacks
S Das, C Nippert-Eng, LJ Camp
Information & Computer Security 30 (1), 1-18, 2022
392022
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review
N Noah, S Das
Computer Animation and Virtual Worlds 32 (3-4), e2020, 2021
392021
Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content
S Das, B Wang, LJ Camp
arXiv preprint arXiv:1908.05902, 2019
332019
Towards implementing inclusive authentication technologies for older adults
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Who Are You, 2019
332019
Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content
ASM Noman, S Das, S Patil
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
332019
A literature review on virtual reality authentication
JM Jones, R Duezguen, P Mayer, M Volkamer, S Das
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
322021
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
S Das, B Wang, A Kim, LJ Camp
HICSS, 1-10, 2020
292020
Novel Challenges of Safety, Security and Privacy in Extended Reality
J Gugenheimer, WJ Tseng, AH Mhaidli, JO Rixen, M McGill, M Nebeling, ...
CHI Conference on Human Factors in Computing Systems Extended Abstracts, 1-5, 2022
282022
User-centered risk communication for safer browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
282020
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
252020
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
252020
Security and Privacy Evaluation of Popular Augmented and Virtual Reality Technologies
N Noah, S Shearer, S Das
Proceedings of the 2022 IEEE International Conference on Metrology for …, 2022
242022
系统目前无法执行此操作,请稍后再试。
文章 1–20