[ Publications of year 2020 ]

Articles in journals or book chapters (4)
  1. Laura Calloway, Hilda Hadan, Shakthidhar Gopavaram, Shrirang Mare, and L. Jean Camp. Privacy in Crisis: The Impact of Public Health Crises on Participants’ Privacy Preferences. Indiana University Security and Privacy in Informatics, Computing and Engineering, 07 2020. [bibtex-entry]

  2. L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven Myers, Shwetak Patel, and Joshua Streiff. Towards a Secure IoT: Directions for IoT Research. IEEE Security \& Privacy, 2020.
    Note: To appear. [bibtex-entry]

  3. Jayati Dev, Emilee Rader, and Sameer Patil. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. 2020. [bibtex-entry]

  4. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2), 2020.
    Note: To appear. [bibtex-entry]

Conference publications (3)
  1. Hilda Hadan and Sameer Patil. Understanding Perceptions of Smart Devices. In , 08 2020. [bibtex-entry]

  2. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT. [bibtex-entry]

  3. Jacob Abbott and Sameer Patil. How Mandatory Second Factor Affects the Authentication User Experience. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, New York, NY, USA, pages 1–13, 2020. Association for Computing Machinery.
    Keywords: security, university it, multi-factor authentication, two-factor authentication, ux, user experience, login, 2fa. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Wed Sep 23 01:00:06 2020
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House