[ Publications of year 2019 ]

Articles in journals or book chapters (2)
  1. L. Jean Camp and Sanchari Das. Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?. In . Springer US, March 2019.
    Keywords: 2FA, authentication, human factors, usability. [bibtex-entry]

  2. Hamid Mehmood, Tallal Ahmad, Lubna Razaq, Shrirang Mare, Maryem Zafar Usmani, Richard J. Anderson, and Agha Ali Raza. Towards Digitization of Collaborative Savings Among Low-Income Groups. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 3(CSCW), November 2019.
    Keywords: referred. [bibtex-entry]

Conference publications (16)
  1. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L. Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In Proceedings of the IEEE Humans and Cyber Security Workshop, December 2019.
    Keywords: referred. [bibtex-entry]

  2. Vafa Andalibi, DongInn Kim, and L. Jean Camp. Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19), Renton, WA, July 2019. USENIX Association.
    Keywords: MUD, IoT. [bibtex-entry]

  3. Hilda Hadan, Nicolas Serrano, Sanchari Das, and L. Jean Camp. Making IoT Worthy of Human Trust. In , 07 2019. [bibtex-entry]

  4. Fahad Pervaiz, Rai Shah Nawaz, Muhammad Umer Ramzan, Maryem Zafar Usmani, Shrirang Mare, Kurtis Heimerl, Faisal Kamiran, Richard J. Anderson, and Lubna Razaq. An Assessment of SMS Fraud in Pakistan. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), July 2019.
    Keywords: referred. [bibtex-entry]

  5. Aditya Vashistha, Richard J. Anderson, and Shrirang Mare. Examining the Use and Non-Use of Mobile Payment Systems for Merchant Payments in India. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), July 2019.
    Keywords: referred. [bibtex-entry]

  6. Jonathan Schubauer, Anjanette Raymond, and Dhruv Madappa. Over-Priviliged Permission: Using Technology and Design to Create Privacy Compliance. In , June 2019. IACL.
    Keywords: Ad Libraries, Privacy, Consent. [bibtex-entry]

  7. Shrirang Mare, Logan Girvin, Franziska Roesner, and Tadayoshi Kohno. Consumer Smart Homes: Where We Are and Where We Need to Go. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2019.
    Keywords: referred. [bibtex-entry]

  8. Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. Continuous Smartphone Authentication using Wristbands. In Proceedings of the Workshop on Usable Security and Privacy (USEC), February 2019.
    Keywords: workshop. [bibtex-entry]

  9. Jacob Abbott, Gege Gao, and Patrick Shih. Creen: A Carbon Footprint Calculator Designed for Calculation in Context. In International Conference on Information, pages 769--776, 2019. Springer.
    Keywords: Sustainability, IoT, HCI. [bibtex-entry]

  10. Jacob Abbott, Novia Nurain Haley MacLeod, Gustave Ekobe, and Sameer Patil. Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019. ACM.
    Keywords: Health, Privacy, Methodology, Data Sharing, Anonymization. [bibtex-entry]

  11. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: 2FA. [bibtex-entry]

  12. Sanchari Das, Joshua Streiff, Lisa Huber, and L Jean Camp. WHY DON’T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN. In Innovation in Aging, Volume 3, Issue Supplement_1, November 2019, pages S325–S326, 2019. GOA.
    Keywords: 2FA. [bibtex-entry]

  13. Nicolas Serrano, Hilda Hadan, and L. Jean Camp. A Complete Study of P.K.I. (PKI’s Known Incidents). In The 47th Research Conference on Communications, Information, and Internet Policy, 2019. TPRC.
    Keywords: PKI. [bibtex-entry]

  14. Kushal Shah, Shrirang Mare, and Richard J. Anderson. Understanding Mobile Money Grievances from Tweets. In Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD), January 2019.
    Keywords: poster. [bibtex-entry]

  15. Joshua Streiff, Sanchari Das, and Joshua Cannon. Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: IoT. [bibtex-entry]

  16. Joshua Streiff, Connie Justics, and L Jean Camp. Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate. In Proceedings of the 13th European Conference on Games Based Learning, pages 1046--1050, 2019. ACPI.
    Keywords: IoT. [bibtex-entry]

Posters and Presentations (10)
  1. Joshua Streiff. Practical Cybersecurity and Manipulative Gaming Education. A Flipping the Switch! Cybersecurity Workshop Session at Indiana Department of Education Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  2. Joshua Streiff. Bears, Unicorns, & Crockpots, Oh My! An Introduction to Internet of Things (IoT) Threat Modeling Education. An AI & Connected Conference Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  3. Adalibi Streiff and S. Das. Securtle: The Security Turtle. A Bsides STL Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  4. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2019.
    Keywords: IoT. [bibtex-entry]

  5. Joshua Streiff. Educational Hacking Using Command Line & Bluetooth Low Energy. An Avon STEM Educator Leadership Day Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  6. Adalibi Streiff and S. Das. Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys. A Bsides MSP Workshop, September 2019.
    Keywords: IoT. [bibtex-entry]

  7. Niang Chin, Sameer Patil, and Joshua Streiff. The Overly Friendly Crockpot. Trusted CI Poster Session (IL), July 2019.
    Keywords: IoT. [bibtex-entry]

  8. Nathaly Reynaga, Behnod Momensadeh, Joshua Streiff, and Sameer Patil. The One Where Patty Trusted Her Printer: The Threat of IoT Printers. IU GROUPS STEM Poster (IN), July 2019.
    Keywords: IoT. [bibtex-entry]

  9. Joshua Streiff. Capturing Education: CTF and IoT in K-12 Education. A Luddy Hall Pathfinders Workshop, July 2019.
    Keywords: IoT. [bibtex-entry]

  10. Jeremy Gummeson, Mary Baker, Animesh Srivastava, and Shrirang Mare. Controlling devices based on collocation of the devices on a user. U.S. Patent 10,331,916, June 2019.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Jul 14 01:00:04 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House