Author: J. D. Tygar

Publications

Publication period start: 2009
Number of co-authors: 5

Co-authors

Number of publications with favourite co-authors
Chris Karlof
1
David Wagner
1
Rachna Dhamija
2

Productive Colleagues

Most productive colleagues in number of publications
L. Jean Camp
8
David Wagner
9
Marti A. Hearst
23

Publications

Camp, L. Jean, Tygar, J. D. (1994): Providing Auditing While Protecting Privacy. In The Information Society, 10 (1) pp. . https://www.indiana.edu/~tisj/readers/abstracts/10/10-1%20Camp.html

Dhamija, Rachna, Tygar, J. D., Hearst, Marti A. (2006): Why phishing works. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 581-590. https://doi.acm.org/10.1145/1124772.1124861

Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf

Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38. https://doi.acm.org/10.1145/1572532.1572578