Volgen
Sanchari Das
Titel
Geciteerd door
Geciteerd door
Jaar
Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key
S Das, A Dingman, LJ Camp
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
1342018
Evaluating user perception of multi-factor authentication: a systematic review
S Das, B Wang, Z Tingle, LJ Camp
arXiv preprint arXiv:1908.05901, 2019
702019
All about phishing: Exploring user research through a systematic literature review
S Das, A Kim, Z Tingle, C Nippert-Eng
arXiv preprint arXiv:1908.05897, 2019
552019
A qualitative study on usability and acceptability of yubico security key
S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
472018
Evaluating the impact of covid-19 on cyberbullying through bayesian trend analysis
S Karmakar, S Das
Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020
412020
Change-point analysis of cyberbullying-related twitter discussions during covid-19
S Das, A Kim, S Karmakar
arXiv preprint arXiv:2008.13613, 2020
372020
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review
N Noah, S Das
Computer Animation and Virtual Worlds 32 (3-4), e2020, 2021
332021
Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation
S Karmakar, S Das
Proceedings of the 54th Hawaii international conference on system sciences, 2021
312021
Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content
S Das, B Wang, LJ Camp
arXiv preprint arXiv:1908.05902, 2019
312019
Towards implementing inclusive authentication technologies for older adults
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Who Are You, 2019
302019
Exploring gender biases in ML and AI academic research through systematic literature review
S Shrestha, S Das
Frontiers in artificial intelligence 5, 976838, 2022
272022
Evaluating user susceptibility to phishing attacks
S Das, C Nippert-Eng, LJ Camp
Information & Computer Security 30 (1), 1-18, 2022
262022
A literature review on virtual reality authentication
JM Jones, R Duezguen, P Mayer, M Volkamer, S Das
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
252021
User-centered risk communication for safer browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
222020
Why Don’t Older Adults Adopt Two-Factor Authentication?
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the …, 2020
192020
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
J Dev, S Das, LJ Camp
HAISA, 135-146, 2018
192018
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
182020
Non-inclusive online security: older adults' experience with two-factor authentication
S Das, A Kim, B Jelen, L Huber, LJ Camp
Proceedings of the 54th Hawaii International Conference on System Sciences, 2020
172020
Modularity is the key a new approach to social media privacy policies
S Das, J Dev, K Srinivasan
Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 1-4, 2018
172018
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
S Das, B Wang, A Kim, LJ Camp
HICSS, 1-10, 2020
162020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20