Complete bibliography

Complete bibliography as a single HTML page

Selection by year

2022 2021 2020 2019 2018 2017 2016 2015 2014
2013 2012 2011 2010 2009 2008 2007 2006 2005
2004 2003 2002 2001 2000 1999 1998 1997 1996
1995 1994 1993

Selection by author

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

A Jacob Abbott Vafa Andalibi
B Kevin Benton Omkar Bhide Warigia Bowman
C Kelly Caine Laura Calloway L. Jean Camp
D Sanchari Das Gary M Deckard Jayati Dev
Andrew Dingman Zheng Dong John DUNCAN
F Allan Friedman
G Vaibhav Garg Shakthidhar Gopavaram Ece Gumusel
H Hilda Hadan Nathaniel Husted
K Timothy Kelley Olivia Kenny DongInn Kim
L Debin Liu
M Shrirang Mare Behnood Momenzadeh Pablo Moriano
R Prashanth Rajivan Gianpaolo Russo
S Jonathan Schubauer Nicolas Serrano Kaushik Srinivasan
Joshua Streiff
T Alex Tsow
V Camilo Viecco
W Rui Wang
Z Xiaoyong Zhou

Selection by category

Books and proceedings Thesis Articles in journals or book chapters
Conference publications Internal reports Posters and Presentations

Selection by keyword

A B C D E F G H I J K L M
N O P Q R S T U V W X Y Z

2 2FA
A Aging AI Anonymization
Authentication
B BGP Browser Fingerprinting
C cluster Computational Social Science Crowdsourcing of Security
ctbh Cultural
D Design for Trust
E E-Crime Economics of Security Emails
End-User Privacy
F Fingerprinting
G Gender Online Governance
H HCI health high performance computing
Human-Centered Computing Human-Centered Security human factors
I ignore information ethics information policy
Insider Threat International internet governance
IoT ists
K K12
L legal bias
M Macroeconomics Marketplace Mental Models
Methodology mhealth Mobile Privacy
mobility MUD
N natural language processing Net Trust Network Engineering
O OSCAR
P Passwords patent Peer Production
Phishing PKI policies
position poster Privacy
Privacy and Security Labels Privacy Labels project-amulet
project-tish project-wifi Psychological Biases
R referred Risk Communication
S SDN security sensors
Social Network Surveillance Sustainability
T techreport two-factor authentication
U Usability Usable Privacy user studies
User Study UX
W wearable wifi workshop




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Jan 25 01:00:10 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House