[ Publications of Sanchari Das ]

Articles in journals or book chapters (4)
  1. L. Jean Camp and Sanchari Das. Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?. In . Springer US, March 2019.
    Keywords: 2FA, authentication, human factors, usability. [bibtex-entry]

  2. Shakthidhar Reddy Gopavaram, Jayati Dev, Sanchari Das, and Jean Camp. IoTMarketplace: Informing Purchase Decisions with Risk Communication. 2019.
    Keywords: IoT, Mental Models, Mobile Privacy. [bibtex-entry]

  3. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. 2018.
    Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry]

  4. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017.
    Keywords: Privacy, two-factor authentication, human factors. [bibtex-entry]

Conference publications (13)
  1. Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, and L Jean Camp. User-Centered Risk Communication for Safer Browsing. In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security, 2020.
    Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry]

  2. Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, and L Jean Camp. Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. In International Symposium on Human Aspects of Information Security and Assurance, pages 211--223, 2020. Springer.
    Keywords: Mobile Privacy, Usable Privacy, Usability. [bibtex-entry]

  3. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L. Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In Proceedings of the IEEE Humans and Cyber Security Workshop, December 2019.
    Keywords: referred. [bibtex-entry]

  4. Hilda Hadan, Nicolas Serrano, Sanchari Das, and L. Jean Camp. Making IoT Worthy of Human Trust. In Social Science Research Network, 07 2019.
    Keywords: PKI. [bibtex-entry]

  5. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: 2FA. [bibtex-entry]

  6. Sanchari Das, Joshua Streiff, Lisa Huber, and L Jean Camp. WHY DON’T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN. In Innovation in Aging, Volume 3, Issue Supplement_1, November 2019, pages S325–S326, 2019. GOA.
    Keywords: 2FA. [bibtex-entry]

  7. Joshua Streiff, Sanchari Das, and Joshua Cannon. Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: IoT. [bibtex-entry]

  8. Sanchari Das, Jayati Dev, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. In ACM, 2018. MEXIHC 2018.
    Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry]

  9. Sanchari Das, Andrew Dingman, and L. Jean Camp. Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. In 2018 International Conference on Financial Cryptography and Data Security (FC), 2018.
    Keywords: 2FA. [bibtex-entry]

  10. Jayati Dev, Sanchari Das, and L Jean Camp. Understanding privacy concerns of whatsapp users in India: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pages 28, 2018. ACM.
    Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry]

  11. Jayati Dev, Sanchari Das, and L Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, 2018. Lulu. com.
    Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry]

  12. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 285--286, 2018. IEEE.
    Keywords: IoT. [bibtex-entry]

  13. Sanchari Das, Javon Goard, and Dakota Murray. How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement. In Proceedings of the 8th International Conference on Social Media & Society, pages 30, 2017. ACM.
    Keywords: Social Network. [bibtex-entry]

Posters and Presentations (4)
  1. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Securtle: The Security Turtle. A Bsides STL Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  2. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys. A Bsides MSP Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  3. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-entry]

  4. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Nov 26 01:00:06 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House