Cynthia Kuo

According to our database1, Cynthia Kuo authored at least 20 papers between 2006 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Nonparametric discovery of human routines from sensor data.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

2013
SAFE: Secure authentication with Face and Eyes.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

Know your enemy: the risk of unauthorized access in smartphones by insiders.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

MARS: a muscle activity recognition system enabling self-configuring musculoskeletal sensor networks.
Proceedings of the 12th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2013), 2013

2012
[MARS] a real time motion capture and muscle fatigue monitoring tool.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

MARS: a muscle activity recognition system using inertial sensors.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

Understanding Users' Requirements for Data Protection in Smartphones.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Usable Mobile Security.
Proceedings of the Distributed Computing and Internet Technology, 2012

Short paper: smartphones: not smart enough?
Proceedings of the SPSM'12, 2012

2011
PEAR: Power efficiency through activity recognition (for ECG-based sensing).
Proceedings of the 5th International Conference on Pervasive Computing Technologies for Healthcare, 2011

2010
Activity-Aware Mental Stress Detection Using Physiological Sensors.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Towards designing better map interfaces for the mobile: experiences from example.
Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, 2010

2009
Designing user studies for security applications: a case study with wireless network configuration.
Int. J. Secur. Networks, 2009

2008
Mind your manners: socially appropriate wireless key establishment for groups.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

GAnGS: gather, authenticate 'n group securely.
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008

2007
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Interactions, 2006

Human selection of mnemonic phrase-based passwords.
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006

Phoolproof Phishing Prevention.
Proceedings of the Financial Cryptography and Data Security, 2006


  Loading...