Rachna Dhamija

According to our database1, Rachna Dhamija authored at least 14 papers between 1999 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
The Seven Flaws of Identity Management: Usability and Security Challenges.
IEEE Secur. Priv., 2008

Use Your Illusion: secure authentication usable anywhere.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

2007
Injecting Heterogeneity Through Protocol Randomization.
Int. J. Netw. Secur., 2007

The Emperor's New Security Indicators.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Preface.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Phoiling phishing.
Proceedings of the 15th international conference on World Wide Web, 2006

Why phishing works.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Stopping spyware at the gate: a user study of privacy, notice and spyware.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

The battle against phishing: Dynamic Security Skins.
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005

Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks.
Proceedings of the Human Interactive Proofs, Second International Workshop, 2005

2001
Animated Exploration of Dynamic Graphs with Radial Layout.
Proceedings of the IEEE Symposium on Information Visualization 2001 (INFOVIS'01), 2001

2000
Deja Vu-A User Study: Using Images for Authentication.
Proceedings of the 9th USENIX Security Symposium, 2000

Hash visualization in user authentication.
Proceedings of the CHI '00 Extended Abstracts on Human Factors in Computing Systems, 2000

1999
Teaching E-Commerce to a Multidisciplinary Class.
Commun. ACM, 1999


  Loading...