Author: J. D. Tygar
Publication Overview
Publication period start: 2009
Number of co-authors: 5
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Camp,
L. Jean,
Tygar,
J. D.
(1994):
Providing Auditing While Protecting Privacy.
In
The Information Society,
10
(1)
pp. .
https://www.indiana.edu/~tisj/readers/abstracts/10/10-1%20Camp.html
Dhamija,
Rachna,
Tygar,
J. D.,
Hearst,
Marti A.
(2006):
Why phishing works.
In:
Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems
,
2006,
.
pp. 581-590.
https://doi.acm.org/10.1145/1124772.1124861
Dhamija,
Rachna,
Tygar,
J. D.
(2005):
The battle against phishing: Dynamic Security Skins.
In:
Proceedings of the 2005 Symposium on Usable Privacy and Security
,
2005,
.
pp. 77-88.
https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf
Karlof,
Chris,
Tygar,
J. D.,
Wagner,
David
(2009):
Conditioned-safe ceremonies and a user study of an application to web authentication.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 38.
https://doi.acm.org/10.1145/1572532.1572578