Author: Eiji Hayashi

Publications

Publication period start: 2012
Number of co-authors: 10

Co-authors

Number of publications with favourite co-authors
Stuart Schechter
1
Jason Hong
3
Nicolas Christin
5

Productive Colleagues

Most productive colleagues in number of publications
Nicolas Christin
9
Jason Hong
20
A. J. Bernheim Brush
40

Publications

Sasamoto, Hirokazu, Christin, Nicolas, Hayashi, Eiji (2008): Undercover: authentication usable in front of prying eyes. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 183-192. https://doi.acm.org/10.1145/1357054.1357085

Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. https://doi.acm.org/10.1145/1572532.1572564

Hasegawa, Madoka, Christin, Nicolas, Hayashi, Eiji (2009): New directions in multisensory authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 44. https://doi.acm.org/10.1145/1572532.1572584

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2011): Security through a different kind of obscurity: evaluating distortion in graphical authent. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2055-2064. https://dx.doi.org/10.1145/1978942.1979242

Hayashi, Eiji, Hong, Jason (2011): A diary study of password usage in daily life. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2627-2630. https://dx.doi.org/10.1145/1978942.1979326

Hayashi, Eiji, Riva, Oriana, Strauss, Karin, Brush, A. J. Bernheim, Schechter, Stuart (2012): Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's ap. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 2. https://dx.doi.org/10.1145/2335356.2335359

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,318 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,318 designers enjoy our newsletter—sure you don’t want to receive it?