The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cynthia Kuo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bryan Parno, Cynthia Kuo, Adrian Perrig
    Phoolproof Phishing Prevention. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:1-19 [Conf]
  2. Cynthia Kuo, Adrian Perrig, Jesse Walker
    Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration. [Citation Graph (0, 0)][DBLP]
    Interactions, 2006, v:13, n:3, pp:28-31 [Journal]

  3. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. [Citation Graph (, )][DBLP]


  4. GAnGS: gather, authenticate 'n group securely. [Citation Graph (, )][DBLP]


  5. Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes. [Citation Graph (, )][DBLP]


  6. Mind your manners: socially appropriate wireless key establishment for groups. [Citation Graph (, )][DBLP]


  7. Human selection of mnemonic phrase-based passwords. [Citation Graph (, )][DBLP]


  8. Towards designing better map interfaces for the mobile: experiences from example. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002