Author: Stuart Schechter

Publications

Publication period start: 2012
Number of co-authors: 7

Co-authors

Number of publications with favourite co-authors
A. J. Bernheim Brush
3
Serge Egelman
3
Robert W. Reeder
3

Productive Colleagues

Most productive colleagues in number of publications
Serge Egelman
13
Robert W. Reeder
14
A. J. Bernheim Brush
40

Publications

Karlson, Amy K., Brush, A. J. Bernheim, Schechter, Stuart (2009): Can i borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1647-1650. https://doi.acm.org/10.1145/1518701.1518953

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1983-1992. https://doi.acm.org/10.1145/1518701.1519003

Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544

Schechter, Stuart, Brush, A. J. Bernheim, Egelman, Serge (2009): It\'s no secret: measuring the security and reliability of authentication via \'secret\' q. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 40. https://doi.acm.org/10.1145/1572532.1572580

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581

Hayashi, Eiji, Riva, Oriana, Strauss, Karin, Brush, A. J. Bernheim, Schechter, Stuart (2012): Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 2. https://dx.doi.org/10.1145/2335356.2335359