Search Results - "Stobert, Elizabeth"
-
1
CD122 signaling in CD8+ memory T cells drives costimulation-independent rejection
Published in The Journal of clinical investigation (01-10-2018)“…Interrupting T cell costimulatory signals as a strategy to control undesired immune responses, such as occur in autoimmunity or transplantation, has the…”
Get full text
Journal Article -
2
Memorability of assigned random graphical passwords
Published 2011“…When allowed to select their own passwords, users often choose easily guessed passwords. Assigning random passwords removes this threat, but assigned passwords…”
Get full text
Dissertation -
3
CD122 signaling in CD8^sup +^ memory T cells drives costimulation-independent rejection
Published in The Journal of clinical investigation (01-10-2018)“…Interrupting T cell costimulatory signals as a strategy to control undesired immune responses, such as occur in autoimmunity or transplantation, has the…”
Get full text
Journal Article -
4
CD122 signaling in [CD8.sup.+] memory T cells drives costimulation-independent rejection
Published in The Journal of clinical investigation (01-10-2018)“…Interrupting T cell costimulatory signals as a strategy to control undesired immune responses, such as occur in autoimmunity or transplantation, has the…”
Get full text
Journal Article -
5
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism
Published in IEEE transactions on dependable and secure computing (01-03-2012)“…This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and…”
Get full text
Journal Article -
6
OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Published in IEEE internet computing (26-03-2018)“…Two attractive features of cloud storage services are the automatic synchronization of files between multiple client devices and the possibility to share files…”
Get full text
Journal Article -
7
OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Published in IEEE internet computing (01-07-2018)“…Two attractive features of cloud storage services are (1) the automatic synchronization of files between multiple devices and (2) the possibility of sharing…”
Get full text
Journal Article -
8
"I don't really give them piece of mind": User Perceptions of Social Engineering Attacks
Published in 2022 APWG Symposium on Electronic Crime Research (eCrime) (30-11-2022)“…How do end users understand social engineering attacks, and how do their perceptions of these attacks differ from reality? To investigate, we proposed a new…”
Get full text
Conference Proceeding -
9
A first look at the usability of bitcoin key management
Published 12-02-2018“…Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has a number of security and usability challenges that differ from…”
Get full text
Journal Article -
10
Exploring Website Location as a Security Indicator
Published 12-10-2016“…Authenticating websites is an ongoing problem for users. Recent proposals have suggested strengthening current server authentication methods by incorporating…”
Get full text
Journal Article -
11
Visual end-user security
Published in 2012 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC) (01-09-2012)“…In our work, we examine ways to apply work on graphical passwords to password management and other aspects of web security. We hope that applying knowledge…”
Get full text
Conference Proceeding -
12
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices
Published 06-11-2015“…Cloud storage services like Dropbox and Google Drive are widely used by individuals and businesses. Two attractive features of these services are 1) the…”
Get full text
Journal Article -
13
Teaching Authentication as a Life Skill
Published in IEEE security & privacy (01-09-2018)“…As more and more of the activities of daily living move into the digital realm, the importance of securing those activities grows. Where once an understanding…”
Get full text
Magazine Article