[ Publications of year 2020 ]

Articles in journals or book chapters (3)
  1. L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven Myers, Shwetak Patel, and Joshua Streiff. Towards a Secure IoT: Directions for IoT Research. IEEE Security \& Privacy, 2020.
    Note: To appear.
    @Article{ camp19-iot,
    presort = {b},
    author = {L. Jean Camp and Ryan Henry and Tadayoshi Kohno and Shrirang Mare and Steven Myers and Shwetak Patel and Joshua Streiff},
    journal = ieee-sp,
    note = {To appear},
    title = {Towards a Secure {IoT}: Directions for {IoT} Research},
    year = {2020},
    url = {https://www.shrirangmare.com/papers/camp2020-iot.pdf} }

  2. Jayati Dev, Emilee Rader, and Sameer Patil. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. 2020.
    @Article{ devjohnny,
    title = {Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email},
    author = {Dev, Jayati and Rader, Emilee and Patil, Sameer},
    booktitle = {Proceedings of the CHI Conference on Human Factors in Computing Systems},
    year = {2020},
    organization = {ACM} }

  3. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2), 2020.
    Note: To appear.
    @Article{ mare20-airbnb,
    presort = {a},
    author = {Shrirang Mare and Franziska Roesner and Tadayoshi Kohno},
    entrysubtype = {None},
    journal = popets,
    note = {To appear},
    number = {2},
    title = {Smart Devices in {A}irbnbs: Considering Privacy and Security for both Guests and Hosts},
    volume = {2020},
    year = {2020},
    url = {https://www.shrirangmare.com/papers/mare2020-airbnb.pdf} }

Conference publications (2)
  1. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT.
    @InProceedings{ dikim20:block_pi,
    author = {DongInn Kim and Vafa Andalibi and L Jean Camp},
    title = {Fingerprinting Edge and Cloud Services in IoT},
    booktitle = {Systematic Approaches to Digital Forensic Engineering},
    year = 2020,
    address = {City University of New York (CUNY), New York City},
    month = {May},
    publisher = {IEEE Computer Society},
    url = {http://www.usablesecurity.net/projects/IoT/papers/Fingerprinting_IoT_Final.pdf},
    keywords = "Fingerprinting, IoT",
    institution = {Cisco, NSF} }

  2. Jacob Abbott and Sameer Patil. How Mandatory Second Factor Affects the Authentication User Experience. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, New York, NY, USA, pages 1–13, 2020. Association for Computing Machinery.
    Keywords: security, university it, multi-factor authentication, two-factor authentication, ux, user experience, login, 2fa.
    @InProceedings{ abbott2020mandatory,
    author = {Abbott, Jacob and Patil, Sameer},
    title = {How Mandatory Second Factor Affects the Authentication User Experience},
    year = {2020},
    isbn = {9781450367080},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3313831.3376457},
    doi = {10.1145/3313831.3376457},
    booktitle = {Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
    pages = {1–13},
    numpages = {13},
    keywords = {security, university it, multi-factor authentication, two-factor authentication, ux, user experience, login, 2fa},
    location = {Honolulu, HI, USA},
    series = {CHI ’20} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Aug 11 01:00:06 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House