Author: Stuart Schechter
Publication Overview
Publication period start: 2012
Number of co-authors: 7
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Karlson,
Amy K.,
Brush,
A. J. Bernheim,
Schechter,
Stuart
(2009):
Can i borrow your phone?: understanding concerns when sharing mobile phones.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 1647-1650.
https://doi.acm.org/10.1145/1518701.1518953
Schechter,
Stuart,
Egelman,
Serge,
Reeder,
Robert W.
(2009):
It\'s not what you know, but who you know: a social approach to last-resort authentication.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 1983-1992.
https://doi.acm.org/10.1145/1518701.1519003
Schechter,
Stuart,
Reeder,
Robert W.
(2009):
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 9.
https://doi.acm.org/10.1145/1572532.1572544
Schechter,
Stuart,
Brush,
A. J. Bernheim,
Egelman,
Serge
(2009):
It\'s no secret: measuring the security and reliability of authentication via \'secret\' q.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 40.
https://doi.acm.org/10.1145/1572532.1572580
Schechter,
Stuart,
Egelman,
Serge,
Reeder,
Robert W.
(2009):
It\'s not what you know, but who you know: a social approach to last-resort authentication.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 41.
https://doi.acm.org/10.1145/1572532.1572581
Hayashi,
Eiji,
Riva,
Oriana,
Strauss,
Karin,
Brush,
A. J. Bernheim,
Schechter,
Stuart
(2012):
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 2.
https://dx.doi.org/10.1145/2335356.2335359