Eiji Hayashi
Eiji Hayashi
Google
Geverifieerd e-mailadres voor hayashi.io - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Use your illusion: secure authentication usable anywhere
E Hayashi, R Dhamija, N Christin, A Perrig
Proceedings of the 4th symposium on Usable privacy and security, 35-45, 2008
1722008
CASA: context-aware scalable authentication
E Hayashi, S Das, S Amini, J Hong, I Oakley
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-10, 2013
1582013
Undercover: authentication usable in front of prying eyes
H Sasamoto, N Christin, E Hayashi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1372008
A diary study of password usage in daily life
E Hayashi, J Hong
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1242011
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications
E Hayashi, O Riva, K Strauss, AJB Brush, S Schechter
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-11, 2012
882012
Wave to me: user identification using body lengths and natural gestures
E Hayashi, M Maas, JI Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
472014
Exploring capturable everyday memory for autobiographical authentication
S Das, E Hayashi, JI Hong
Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013
412013
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
E Hayashi, J Hong, N Christin
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
292011
WebTicket: Account Management Using Printable Tokens
E Hayashi, B Pendleton, F Ozenc, J Hong
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
232012
Device locking with hierarchical activity preservation
S Schechter, AJB Brush, O Riva, K Strauss, E Hayashi
US Patent 8,732,822, 2014
212014
TimeBlocks: "Mom, Can I Have Another Block of Time?"
E Hayashi, M Rau, ZH Neo, N Tan, S Ramasubramanian, E Paulos
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
92012
New directions in multisensory authentication.
M Hasegawa, N Christin, E Hayashi
SOUPS, 2009
92009
Investigating collaborative mobile search behaviors
S Amini, V Setlur, Z Xi, E Hayashi, J Hong
Proceedings of the 15th international conference on Human-computer …, 2013
72013
Knock x knock: the design and evaluation of a unified authentication management system
E Hayashi, JI Hong
Proceedings of the 2015 ACM International Joint Conference on Pervasive and …, 2015
52015
Mental trapdoors for user authentication on small mobile devices
E Hayashi, N Christin, R Dhamija, A Perrig
42007
It's Hidden in My Computer": Exploring Account Management Tools and Behaviors
E Hayashi, J Hong
CMU-CyLab-13-007, 2013
22013
Evaluating the use of autobiographical memory for authentication
S Das, E Hayashi, JI Hong, I Oakley
Symposium On Usable Privacy and Security (SOUPS), 2012
22012
A diary study of password usage in daily life
E Hayashi, JI Hong
22010
Smartphone-Based Radar System for Determining User Intention in a Lower-Power Mode
L Giusti, I Poupyrev, E Hayashi, PM Amihood
US Patent App. 16/166,900, 2020
12020
Seamless Authentication Using Radar
B Barbello, L Giusti, I Poupyrev, E Hayashi
US Patent App. 15/844,229, 2019
12019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20