Tadayoshi Kohno

Personal Homepage

Publication Statistics

Publication period start
Publication period end
Number of co-authors

Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications


Roesner, Franziska, Fogarty, James, Kohno, Tadayoshi (2012): User interface toolkit mechanisms for securing interface elements. In: Proceedings of the 2012 ACM Symposium on User Interface Software and Technology , 2012, . pp. 239-250. http://dx.doi.org/10.1145/2380116.2380147

Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian, Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 15. http://doi.acm.org/10.1145/1837110.1837130

Denning, Tamara, Borning, Alan, Friedman, Batya, Gill, Brian T., Kohno, Tadayoshi, Maisel, William H. (2010): Patients, pacemakers, and implantable defibrillators: human values and security for wirele. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 917-926. http://doi.acm.org/10.1145/1753326.1753462

Everitt, Katherine M., Bragin, Tanya, Fogarty, James, Kohno, Tadayoshi (2009): A comprehensive study of frequency, interference, and training of multiple graphical passw. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 889-898. http://doi.acm.org/10.1145/1518701.1518837

Halperin, Daniel, Heydt-Benjamin, Thomas S., Fu, Kevin, Kohno, Tadayoshi, Maisel, William H. (2008): Security and Privacy for Implantable Medical Devices. In IEEE Pervasive Computing, 7 (1) pp. 30-39. http://doi.ieeecomputersociety.org/10.1109/MPRV.2008.16

Kohno, Tadayoshi (2008): An Interview with RFID Security Expert Ari Juels. In IEEE Pervasive Computing, 7 (1) pp. 10-11. http://doi.ieeecomputersociety.org/10.1109/MPRV.2008.4

Kriplean, Travis, Welbourne, Evan, Khoussainova, Nodira, Rastogi, Vibhor, Balazinska, Magdalena, Borriello, Gaetano, Kohno, Tadayoshi, Suciu, Dan (2007): Physical Access Control for Captured RFID Data. In IEEE Pervasive Computing, 6 (4) pp. 48-55. http://doi.ieeecomputersociety.org/10.1109/MPRV.2007.81

Viega, John, Kohno, Tadayoshi, Potter, Bruce (2001): Trust (and mistrust) in secure applications. In Communications of the ACM, 44 (2) pp. 31-36. http://doi.acm.org/10.1145/359205.359223