Author: Tadayoshi Kohno

Publication Overview

Publication period start: 2012
Number of co-authors: 25

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Kohno, Tadayoshi (2008): An Interview with RFID Security Expert Ari Juels. In IEEE Pervasive Computing, 7 (1) pp. 10-11. https://doi.ieeecomputersociety.org/10.1109/MPRV.2008.4
Halperin, Daniel, Heydt-Benjamin, Thomas S., Fu, Kevin, Kohno, Tadayoshi, Maisel, William H. (2008): Security and Privacy for Implantable Medical Devices. In IEEE Pervasive Computing, 7 (1) pp. 30-39. https://doi.ieeecomputersociety.org/10.1109/MPRV.2008.16
Kriplean, Travis, Welbourne, Evan, Khoussainova, Nodira, Rastogi, Vibhor, Balazinska, Magdalena, Borriello, Gaetano, Kohno, Tadayoshi, Suciu, Dan (2007): Physical Access Control for Captured RFID Data. In IEEE Pervasive Computing, 6 (4) pp. 48-55. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.81
Viega, John, Kohno, Tadayoshi, Potter, Bruce (2001): Trust (and mistrust) in secure applications. In Communications of the ACM, 44 (2) pp. 31-36. https://dl.acm.org/doi/10.1145/359205.359223
Everitt, Katherine M., Bragin, Tanya, Fogarty, James, Kohno, Tadayoshi (2009): A comprehensive study of frequency, interference, and training of multiple graphical passw. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 889-898. https://doi.acm.org/10.1145/1518701.1518837
Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian, Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 15. https://doi.acm.org/10.1145/1837110.1837130
Denning, Tamara, Borning, Alan, Friedman, Batya, Gill, Brian T., Kohno, Tadayoshi, Maisel, William H. (2010): Patients, pacemakers, and implantable defibrillators: human values and security for wirele. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 917-926. https://doi.acm.org/10.1145/1753326.1753462
Roesner, Franziska, Fogarty, James, Kohno, Tadayoshi (2012): User interface toolkit mechanisms for securing interface elements. In: Proceedings of the 2012 ACM Symposium on User Interface Software and Technology , 2012, . pp. 239-250. https://dx.doi.org/10.1145/2380116.2380147
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 326,012 others.

Learn to design a life you love.

Next email in:
5
days
21
hrs
36
mins
3
secs