Elizabeth Stobert

According to our database1, Elizabeth Stobert authored at least 26 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
"I don't really give them piece of mind": User Perceptions of Social Engineering Attacks.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

2021
How Do Users Chain Email Accounts Together?
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Authentication Management of Home IoT Devices.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
ByPass: Reconsidering the Usability of Password Managers.
Proceedings of the Security and Privacy in Communication Networks, 2020

Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2020

Understanding Cybersecurity Practices in Emergency Departments.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Understanding Perceptions: User Responses to Browser Warning Messages.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

2018
The Password Life Cycle.
ACM Trans. Priv. Secur., 2018

OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
IEEE Internet Comput., 2018

Teaching Authentication as a Life Skill.
IEEE Secur. Priv., 2018

A first look at the usability of bitcoin key management.
CoRR, 2018

2017
Teaching Authentication in High Schools: Challenges and Lessons Learned.
Proceedings of the 2017 USENIX Workshop on Advances in Security Education, 2017

2016
Exploring Website Location as a Security Indicator.
CoRR, 2016

Picking a (Smart)Lock: Locking Relationships on Mobile Devices.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

2015
Expert Password Management.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

2014
The Password Life Cycle: User Behaviour in Managing Passwords.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

A Password Manager that Doesn't Remember Passwords.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

The agony of passwords: can we learn from user coping strategies?
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Memory retrieval and graphical passwords.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
IEEE Trans. Dependable Secur. Comput., 2012

Visual end-user security.
Proceedings of the 2012 IEEE Symposium on Visual Languages and Human-Centric Computing, 2012

The MVP Web-Based Authentication Framework - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2010
Usability and strength in click-based graphical passwords.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Exploring usability effects of increasing security in click-based graphical passwords.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Multiple password interference in text passwords and click-based graphical passwords.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009


  Loading...