Complete bibliography

Complete bibliography as a single HTML page

Selection by year

2020 2019 2018 2017 2016 2015 2014 2013 2012
2011 2010 2009 2008 2007 2006 2005 2004 2003
2002 2001 2000 1999 1998 1997 1996 1995 1994
1993

Selection by author

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

A Jacob Abbott Vafa Andalibi
B Kevin Benton Omkar Bhide Warigia Bowman
C Kelly Caine Laura Calloway L. Jean Camp
D Sanchari Das Gary M Deckard Jayati Dev
Andrew Dingman Zheng Dong John Duncan
F Allan Friedman
G Vaibhav Garg Shakthidhar Gopavaram
H Hilda Hadan Nathaniel Husted
K Timothy Kelley Olivia Kenny DongInn Kim
L Debin Liu
M Shrirang Mare Behnood Momenzadeh Pablo Moriano
R Prashanth Rajivan Gianpaolo Russo
S Jonathan Schubauer Nicolas Serrano Kaushik Srinivasan
Joshua Streiff
T Alex Tsow
V Camilo Viecco
W Rui Wang
Z Xiaoyong Zhou

Selection by category

Books and proceedings Thesis Articles in journals or book chapters
Conference publications Internal reports Posters and Presentations

Selection by keyword

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

2 2FA
A Aging AI Anonymization
authentication
B BGP
C cluster Computational Social Science Crowdsourcing of Security
ctbh Cultural
D Design for Trust
E E-Crime Economics of Security Emails
F Fingerprinting
G Gender Online Governance
H HCI Health high performance computing
Human-Centered Computing Human-Centered Security human factors
I ignore Insider Threat International
Internet Governance IoT ists
M Macroeconomics Mental Models Methodology
mhealth Mobile Privacy mobility
MUD
N Net Trust Network Engineering
O OSCAR
P Passwords patent Peer Production
Phishing PKI Policies
position poster Privacy
project-amulet project-tish project-wifi
R referred Risk Communication
S SDN Security sensors
Social Network Surveillance Sustainability
T techreport two-factor authentication
U Usability Usable Privacy user studies
User Study UX
W wearable wifi workshop




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Nov 26 01:00:09 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House