Popular related searches


Author: Karen Renaud


Publication period start: 2003
Number of co-authors: 11


Number of publications with favourite co-authors
Joseph Maguire
Judy van Biljon
Judith Ramsay

Productive Colleagues

Most productive colleagues in number of publications
Lynne Coventry
Judith Ramsay
Antonella De Angeli


Renaud, Karen, Biljon, Judy van (2010): Worth-centred mobile phone design for older users. In Universal Access in the Information Society, 9 (4) pp. 387-403. https://www.springerlink.com/content/pm238401103l17ur/

Renaud, Karen (2009): On user involvement in production of images used in visual authentication. In J. Vis. Lang. Comput., 20 (1) pp. 1-15. https://dx.doi.org/10.1016/j.jvlc.2008.04.001

Renaud, Karen, Ramsay, Judith, Hair, Mario (2008): Think before you link: controlling ubiquitous availability. In Interactions, 15 (6) pp. 65-68. https://dl.acm.org/doi/10.1145/1409040.1409057

Renaud, Karen, Ramsay, Judith (2007): Now what was that password again? A more flexible way of identifying and authenticating ou. In Behaviour and Information Technology, 26 (4) pp. 309-322. https://www.informaworld.com/10.1080/01449290601173770

Renaud, Karen, Ramsay, Judith, Hair, Mario (2006): . In International Journal of Human-Computer Interaction, 21 (3) pp. 313-332. https://www.leaonline.com/doi/abs/10.1207/s15327590ijhc2103_3

Angeli, Antonella De, Coventry, Lynne, Johnson, Graham, Renaud, Karen (2005): Is a picture really worth a thousand words? Exploring the feasibility of graphical authent. In International Journal of Human-Computer Studies, 63 (1) pp. 128-152. https://dx.doi.org/10.1016/j.ijhcs.2005.04.020

Renaud, Karen, Angeli, Antonella De (2004): My password is here! An investigation into visuo-spatial authentication mechanisms. In Interacting with Computers, 16 (6) pp. 1017-1041. https://dx.doi.org/10.1016/j.intcom.2004.06.012

Biljon, Judy van, Renaud, Karen (2003): Zazu - Investigating the Difference between Interaction Approaches in Advisory Support Sys. In: Proceedings of IFIP INTERACT03: Human-Computer Interaction , 2003, Zurich, Switzerland. pp. 983.

Nosseir, Ann, Connor, Richard, Renaud, Karen (2006): Question-based group authentication. In: Kjeldskov, Jesper, Paay, Jane (eds.) Proceedings of OZCHI06, the CHISIG Annual Conference on Human-Computer Interaction , 2006, . pp. 277-283. https://doi.acm.org/10.1145/1228175.1228223

Biljon, Judy van, Kotze, Paula, Renaud, Karen (2008): Mobile phone usage of young adults: the impact of motivational factors. In: Proceedings of OZCHI08 - the CHISIG Annual Conference on Human-Computer Interaction , 2008, . pp. 57-64. https://doi.acm.org/10.1145/1517744.1517761

Renaud, Karen, Maguire, Joseph (2009): Armchair authentication. In: Proceedings of the HCI09 Conference on People and Computers XXIII , 2009, . pp. 388-397. https://doi.acm.org/10.1145/1671011.1671061

Renaud, Karen, Just, Mike (2010): Pictures or questions?: examining user responses to association-based authentication. In: Proceedings of the HCI10 Conference on People and Computers XXIV , 2010, . pp. 98-107. https://dl.acm.org/citation.cfm?id=2146318

Maguire, Joseph, Renaud, Karen (2012): You only live twice or "the years we wasted caring about shoulder-surfing. In: Proceedings of the HCI12 Conference on People and Computers XXVI , 2012, . pp. 404-409. https://dl.acm.org/citation.cfm?id=2377975