[ Publications of Jacob Abbott ]
|Articles in journals or book chapters (1)|
Jacob Abbott and Violeta Moreno Garcia.
Password differences based on language and testing of memory recall.
NNGT International Journal of Information Security,
Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]
|Conference publications (5)|
and Patrick Shih.
Creen: A Carbon Footprint Calculator Designed for Calculation in Context.
In International Conference on Information,
Keywords: Sustainability, IoT, HCI. [bibtex-entry]
Novia Nurain Haley MacLeod,
and Sameer Patil.
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI.
In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems,
Keywords: Health, Privacy, Methodology, Data Sharing, Anonymization. [bibtex-entry]
and L Jean Camp.
Factors Influencing Password Reuse: A Case Study.
In TPRC46: Research Conference on Communications, Information and Internet Policy,
Keywords: Passwords, Policies, Requirements, Reuse. [bibtex-entry]
and Sameer Patil.
Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases.
In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17),
Keywords: Privacy, Health, Rare Diseases, Anonymized Data. [bibtex-entry]
L. Jean Camp,
and Siyu Chen.
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
In 2016 49th Hawaii International Conference on System Sciences (HICSS),
Keywords: Human-Centered Security, Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]
|Posters and Presentations (1)|
and L. Jean Camp.
Password Differences based on Language and Testing of Memory Recall.
Annual Computer Security Applications Conference, (New Oleans, LA),
Keywords: Human-Centered Security. [bibtex-entry]
BACK TO INDEX
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Sun Apr 5 01:00:05 2020