Author: J. D. Tygar
Publications
Co-authors
Productive Colleagues
Publications
Camp, L. Jean, Tygar, J. D. (1994): Providing Auditing While Protecting Privacy. In The Information Society, 10 (1) pp. . https://www.indiana.edu/~tisj/readers/abstracts/10/10-1%20Camp.html
Dhamija, Rachna, Tygar, J. D., Hearst, Marti A. (2006): Why phishing works. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 581-590. https://doi.acm.org/10.1145/1124772.1124861
Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf
Karlof, Chris, Tygar, J. D., Wagner, David (2009): Conditioned-safe ceremonies and a user study of an application to web authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 38. https://doi.acm.org/10.1145/1572532.1572578