Author: Tadayoshi Kohno

Publications

Publication period start: 2012
Number of co-authors: 25

Co-authors

Number of publications with favourite co-authors
William H. Maisel
2
Alan Borning
2
Batya Friedman
2

Productive Colleagues

Most productive colleagues in number of publications
Batya Friedman
34
James Fogarty
35
Gaetano Borriello
37

Publications

Kohno, Tadayoshi (2008): An Interview with RFID Security Expert Ari Juels. In IEEE Pervasive Computing, 7 (1) pp. 10-11. https://doi.ieeecomputersociety.org/10.1109/MPRV.2008.4

Halperin, Daniel, Heydt-Benjamin, Thomas S., Fu, Kevin, Kohno, Tadayoshi, Maisel, William H. (2008): Security and Privacy for Implantable Medical Devices. In IEEE Pervasive Computing, 7 (1) pp. 30-39. https://doi.ieeecomputersociety.org/10.1109/MPRV.2008.16

Kriplean, Travis, Welbourne, Evan, Khoussainova, Nodira, Rastogi, Vibhor, Balazinska, Magdalena, Borriello, Gaetano, Kohno, Tadayoshi, Suciu, Dan (2007): Physical Access Control for Captured RFID Data. In IEEE Pervasive Computing, 6 (4) pp. 48-55. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.81

Viega, John, Kohno, Tadayoshi, Potter, Bruce (2001): Trust (and mistrust) in secure applications. In Communications of the ACM, 44 (2) pp. 31-36. https://dl.acm.org/doi/10.1145/359205.359223

Everitt, Katherine M., Bragin, Tanya, Fogarty, James, Kohno, Tadayoshi (2009): A comprehensive study of frequency, interference, and training of multiple graphical passw. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 889-898. https://doi.acm.org/10.1145/1518701.1518837

Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian, Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 15. https://doi.acm.org/10.1145/1837110.1837130

Denning, Tamara, Borning, Alan, Friedman, Batya, Gill, Brian T., Kohno, Tadayoshi, Maisel, William H. (2010): Patients, pacemakers, and implantable defibrillators: human values and security for wirele. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 917-926. https://doi.acm.org/10.1145/1753326.1753462

Roesner, Franziska, Fogarty, James, Kohno, Tadayoshi (2012): User interface toolkit mechanisms for securing interface elements. In: Proceedings of the 2012 ACM Symposium on User Interface Software and Technology , 2012, . pp. 239-250. https://dx.doi.org/10.1145/2380116.2380147

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,866 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,866 designers enjoy our newsletter—sure you don’t want to receive it?