Author: Rachna Dhamija
Publications
Co-authors
Productive Colleagues
Publications
Dhamija, Rachna, Tygar, J. D., Hearst, Marti A. (2006): Why phishing works. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 581-590. https://doi.acm.org/10.1145/1124772.1124861
Good, Nathaniel, Dhamija, Rachna, Grossklags, Jens, Thaw, David, Aronowitz, Steven, Mulligan, Deirdre, Konstan, Joseph A. (2005): Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 43-52. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p43-good.pdf
Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf
Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670
Yee, Ka-Ping, Fisher, Danyel, Dhamija, Rachna, Hearst, Marti A. (2001): Animated Exploration of Dynamic Graphs with Radial Layout. In: InfoVis 2001 , 2001, . pp. 43-50. https://csdl.computer.org/comp/proceedings/infovis/2001/1342/00/13420043abs.htm
Dhamija, Rachna, Cassidy, Peter, Hallam-Baker, Phillip, Jacobsson, Markus (2006): Phoiling phishing. In: Proceedings of the 2006 International Conference on the World Wide Web , 2006, . pp. 749. https://doi.acm.org/10.1145/1135777.1135888