Author: Eiji Hayashi
Publication Overview
Publication period start: 2012
Number of co-authors: 10
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Sasamoto,
Hirokazu,
Christin,
Nicolas,
Hayashi,
Eiji
(2008):
Undercover: authentication usable in front of prying eyes.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 183-192.
https://doi.acm.org/10.1145/1357054.1357085
Hayashi,
Eiji,
Dhamija,
Rachna,
Christin,
Nicolas,
Perrig,
Adrian
(2008):
Use Your Illusion: secure authentication usable anywhere.
In:
Proceedings of the 2008 Symposium on Usable Privacy and Security
,
2008,
.
pp. 35-45.
https://doi.acm.org/10.1145/1408664.1408670
Hayashi,
Eiji,
Hong,
Jason,
Christin,
Nicolas
(2009):
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 25.
https://doi.acm.org/10.1145/1572532.1572564
Hasegawa,
Madoka,
Christin,
Nicolas,
Hayashi,
Eiji
(2009):
New directions in multisensory authentication.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 44.
https://doi.acm.org/10.1145/1572532.1572584
Hayashi,
Eiji,
Hong,
Jason,
Christin,
Nicolas
(2011):
Security through a different kind of obscurity: evaluating distortion in graphical authent.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2055-2064.
https://dx.doi.org/10.1145/1978942.1979242
Hayashi,
Eiji,
Hong,
Jason
(2011):
A diary study of password usage in daily life.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2627-2630.
https://dx.doi.org/10.1145/1978942.1979326
Hayashi,
Eiji,
Riva,
Oriana,
Strauss,
Karin,
Brush,
A. J. Bernheim,
Schechter,
Stuart
(2012):
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap.
In:
Proceedings of the 2012 Symposium on Usable Privacy and Security
,
2012,
.
pp. 2.
https://dx.doi.org/10.1145/2335356.2335359