J. D. Tygar

Publication Statistics

Publication period start
Publication period end
Number of co-authors


Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications


Camp, L. Jean, Tygar, J. D. (1994): Providing Auditing While Protecting Privacy. In The Information Society, 10 (1) pp. . http://www.indiana.edu/~tisj/readers/abstracts/10/10-1%20Camp.html

Dhamija, Rachna, Tygar, J. D., Hearst, Marti A. (2006): Why phishing works. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 581-590. http://doi.acm.org/10.1145/1124772.1124861

Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf

Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38. http://doi.acm.org/10.1145/1572532.1572578