Complete bibliography

Complete bibliography as a single HTML page

Selection by year

2022 2021 2020 2019 2018 2017 2016 2015 2014
2013 2012 2011 2010 2009 2008 2007 2006 2005
2004 2003 2002 2001 2000 1999 1998 1997 1996
1995 1994 1993

Selection by author

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

A Jacob Abbott Vafa Andalibi
B Kevin Benton Omkar Bhide Warigia Bowman
C Kelly Caine Laura Calloway L.Jean Camp
Peter Caven
D Sanchari Das Gary M Deckard Jayati Dev
Andrew Dingman Zheng Dong John DUNCAN
F Allan Friedman
G Vaibhav Garg Shakthidhar Gopavaram Ece Gumusel
H Hilda Hadan Nathaniel Husted
K Timothy Kelley Olivia Kenny Donginn Kim
L Debin Liu
M Shrirang Mare Behnood Momenzadeh Pablo Moriano
R Prashanth Rajivan Gianpaolo Russo
S Jonathan Schubauer Nicolas Serrano Kaushik Srinivasan
Joshua Streiff
T Alex Tsow
V Camilo Viecco
W Rui Wang
Z Zitao Zhang Xiaoyong Zhou

Selection by category

Books and proceedings Thesis Articles in journals or book chapters
Conference publications Internal reports Posters and Presentations

Selection by keyword

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

2 2FA
A accessibility Aging AI
Anonymization Artificial intelligence authentication
B BGP Browser Fingerprinting
C cluster Computational Social Science COVID-19
Crowdsourcing of Security ctbh Cultural
D Design for Trust
E E-Crime Economics of Security Emails
End-User Privacy
F Facebook groups Fingerprinting
G Gender Online Governance
H HCI Health high performance computing
Human-Centered Computing, Human-Centered Security human factors
I ignore Imagined Communities information ethics
information policy input techniques Insider Threat
International internet governance IoT
ists
K K12
L Labels Lockdown
M Machine learning Macroeconomics Marketplace
Mental Models Methodology mhealth
Mobile Privacy mobility MUD
N Natural language processing Net Trust Network Engineering
O Online disinhibition OSCAR
P Passwords patent Peer Production
Phishing PKI policies
position poster Privacy
Privacy and Security Labels Privacy Labels project-amulet
project-tish project-wifi Psychological Biases
R referred Risk Communication
S SBOM SDN security
sensors smart home Social media
Social Network Surveillance Sustainability
synthesized speech
T techreport text entry text-to-speech
TTS two-factor authentication
U usability Usable Privacy user interviews
user studies User Study UX
W wearable wifi workshop




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:18 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House