Complete bibliography

Complete bibliography as a single HTML page

Selection by year

2020 2019 2018 2017 2016 2015 2014 2013 2012
2011 2010 2009 2008 2007 2006 2005 2004 2003
2002 2001 2000 1999 1998 1997 1996 1995 1994
1993

Selection by author

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

A Jacob Abbott Vafa Andalibi
B Kevin Benton Omkar Bhide Warigia Bowman
C Kelly Caine L. Jean Camp
D Sanchari Das Gary M Deckard Jayati Dev
Andrew Dingman Zheng Dong John DUNCAN
F Allan Friedman
G Vaibhav Garg Shakthidhar Gopavaram
H Hilda Hadan Nathaniel Husted
K Timothy Kelley Olivia Kenny DongInn Kim
L Debin Liu
M Shrirang Mare Pablo Moriano
R Prashanth Rajivan Gianpaolo Russo
S Jonathan Schubauer Nicolas Serrano Kaushik Srinivasan
Joshua Streiff
T Alex Tsow
V Camilo Viecco
W Rui Wang
Z Xiaoyong Zhou

Selection by category

Books and proceedings Thesis Articles in journals or book chapters
Conference publications Internal reports Posters and Presentations

Selection by keyword

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

2 2FA
A Ad Libraries Aging Anonymization
Anonymized Data authentication
B BGP Broadside Antenna Array
C cluster Consent Crowdsourcing of Security
ctbh
D Data Sharing Design for Trust
E E-Crime Economics of Information Security
F Fingerprinting FNBW Expression
G Gender Online
H HCI Health high performance computing
Human-Centered Security human factors
I ignore Information Security Internet Governance
IoT ists IT Governance
L login
M Mental Models Methodology mhealth
mobility MUD multi-factor authentication
N Net Trust Network Engineering
O OSCAR
P Passwords patent Peer Production
Permission Phishing PKI
Policies position poster
Privacy project-amulet project-tish
project-wifi
R Rare Diseases referred Requirements
Reuse
S SDN security sensors
Sustainability
T Taylor Distribution techreport two-factor authentication
U university it Usability user experience
User Study ux
W wearable wifi workshop




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Sat Jun 6 01:00:10 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House