Paul Dunphy

Affiliations:
  • University of Newcastle upon Tyne, UK


According to our database1, Paul Dunphy authored at least 34 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Note on the Blockchain Trilemma for Decentralized Identity: Learning from Experiments with Hyperledger Indy.
CoRR, 2022

An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Explainable Machine Learning for Fraud Detection.
Computer, 2021

2019
Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
A First Look at Identity Management Schemes on the Blockchain.
IEEE Secur. Priv., 2018

Decentralizing Digital Identity: Open Challenges for Distributed Ledgers.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

HCI for Blockchain: Studying, Designing, Critiquing and Envisioning Distributed Ledger Technologies.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2016
Speeching: Mobile Crowdsourced Speech Assessment to Support Self-Monitoring and Management for People with Parkinson's.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Using IMUs to Identify Supervisors on Touch Devices.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

Captchat: A Messaging Tool to Frustrate Ubiquitous Surveillance.
Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, 2015

2014
Designing for Spontaneous and Secure Delegation in Digital Payments.
Interact. Comput., 2014

BallotShare: An exploration of the design space for digital voting in the workplace.
Comput. Hum. Behav., 2014

Understanding the Experience-Centeredness of Privacy and Security Technologies.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Pay or delay: the role of technology when managing a low income.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Experience design theatre: exploring the role of live theatre in scaffolding design dialogues.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

PosterVote: expanding the action repertoire for local political activism.
Proceedings of the Designing Interactive Systems Conference 2014, DIS '14, Vancouver, BC, 2014

2013
Usable, secure and deployable graphical passwords.
PhD thesis, 2013

Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Designing interactive secure system: chi 2013 special interest group.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
The joy of cheques: trust, paper and eighty somethings.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012

Taking as an act of sharing.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012

Questionable concepts: critique as resource for designing with eighty somethings.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Cheque mates: participatory design of digital payments with eighty somethings.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

A security assessment of tiles: a new portfolio-based graphical authentication system.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

On automated image choice for secure and usable graphical passwords.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Invisible design: exploring insights and ideas through ambiguous film scenarios.
Proceedings of the Designing Interactive Systems Conference 2012, 2012

2011
Eighty something: banking for the older old.
Proceedings of the 2011 British Computer Society Conference on Human-Computer Interaction, 2011

2010
A closer look at recognition-based graphical passwords on mobile devices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Multi-touch authentication on tabletops.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2008
Securing passfaces for description.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

2007
Graphical passwords & qualitative spatial relations.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Is FacePIN secure and usable?
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Do background images improve "draw a secret" graphical passwords?
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007


  Loading...