Author: Eiji Hayashi

Publication Overview

Publication period start: 2012
Number of co-authors: 10

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Sasamoto, Hirokazu, Christin, Nicolas, Hayashi, Eiji (2008): Undercover: authentication usable in front of prying eyes. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 183-192. https://doi.acm.org/10.1145/1357054.1357085
Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670
Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. https://doi.acm.org/10.1145/1572532.1572564
Hasegawa, Madoka, Christin, Nicolas, Hayashi, Eiji (2009): New directions in multisensory authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 44. https://doi.acm.org/10.1145/1572532.1572584
Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2011): Security through a different kind of obscurity: evaluating distortion in graphical authent. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2055-2064. https://dx.doi.org/10.1145/1978942.1979242
Hayashi, Eiji, Hong, Jason (2011): A diary study of password usage in daily life. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2627-2630. https://dx.doi.org/10.1145/1978942.1979326
Hayashi, Eiji, Riva, Oriana, Strauss, Karin, Brush, A. J. Bernheim, Schechter, Stuart (2012): Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 2. https://dx.doi.org/10.1145/2335356.2335359
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,052 others.

Learn to design a life you love.

Next email in
6
days
11
hrs
53
mins
29
secs