Towards implementing inclusive authentication technologies for older adults S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber Who Are You, 2019 | 30 | 2019 |
Why don’t older adults adopt two-factor authentication? S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the …, 2020 | 20 | 2020 |
Overpowered and underprotected toys empowering parents with tools to protect their children J Streiff, S Das, J Cannon 2019 IEEE 5th International Conference on Collaboration and Internet …, 2019 | 15 | 2019 |
Toward a secure internet of things: directions for research J Camp, R Henry, T Kohno, S Mare, S Myers, S Patel, J Streiff IEEE security & privacy 18 (4), 28-37, 2020 | 11 | 2020 |
Security mandates are pervasive: An inter-school study on analyzing user authentication behavior S Das, A Kim, S Mare, J Streiff, LJ Camp 2019 IEEE 5th International Conference on Collaboration and Internet …, 2019 | 11 | 2019 |
Who's watching your child? exploring home security risks with smart toy bears J Streiff, O Kenny, S Das, A Leeth, LJ Camp 2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018 | 11 | 2018 |
A Call for a New Privacy & Security Regime for IoT Smart Toys J Streiff, N Noah, S Das 2022 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2022 | 3 | 2022 |
Why don’t elders adopt two-factor authentication? because they are excluded by design S Das, J Streiff, LL Huber, LJ Camp Innovation in Aging 3 (Supplement_1), S325-S326, 2019 | 3 | 2019 |
Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate J Streiff, C Justice, J Camp European Conference on Games Based Learning, 1046-XXII, 2019 | 3 | 2019 |
Towards a Secure IoT: Directions for IoT Research J Camp, R Henry, T Kohno, S Mare, S Myers, S Patel, J Streiff IEEE Security & Privacy, 2020 | 1 | 2020 |
Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups. J Streiff, T Ringenberg, J Dev, LJ Camp 17th European Conference on Games Based Learning, 2022 | | 2022 |
20 Unleashing the Digital Twin’s Potential for ICS Security M Dietz, G Pernul, LJ Camp, R Henry, T Kohno, S Mare, S Patel, J Streiff, ... | | 2020 |
2019 Cybersecurity Research Transition to Practice Workshop Poster Session A Okutan, V Andalibi, DI Kim, P Moriano, O Kenny, J Streiff, S Jan, ... | | 2019 |