Search Results - "Stobert, Elizabeth"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    CD122 signaling in CD8+ memory T cells drives costimulation-independent rejection by Mathews, David V, Dong, Ying, Higginbotham, Laura B, Kim, Steven C, Breeden, Cynthia P, Stobert, Elizabeth A, Jenkins, Joseph, Tso, J Yun, Larsen, Christian P, Adams, Andrew B

    Published in The Journal of clinical investigation (01-10-2018)
    “…Interrupting T cell costimulatory signals as a strategy to control undesired immune responses, such as occur in autoimmunity or transplantation, has the…”
    Get full text
    Journal Article
  2. 2

    Memorability of assigned random graphical passwords by Stobert, Elizabeth Ann

    Published 2011
    “…When allowed to select their own passwords, users often choose easily guessed passwords. Assigning random passwords removes this threat, but assigned passwords…”
    Get full text
    Dissertation
  3. 3

    CD122 signaling in CD8^sup +^ memory T cells drives costimulation-independent rejection by Mathews, David V, Dong, Ying, Higginbotham, Laura B, Kim, Steven C, Breeden, Cynthia P, Stobert, Elizabeth A, Jenkins, Joseph, Tso, J Yun, Larsen, Christian P, Adams, Andrew B

    Published in The Journal of clinical investigation (01-10-2018)
    “…Interrupting T cell costimulatory signals as a strategy to control undesired immune responses, such as occur in autoimmunity or transplantation, has the…”
    Get full text
    Journal Article
  4. 4

    CD122 signaling in [CD8.sup.+] memory T cells drives costimulation-independent rejection by Mathews, David V, Dong, Ying, Higginbotham, Laura B, Kim, Steven C, Breeden, Cynthia P, Stobert, Elizabeth A, Jenkins, Joseph, Tso, J. Yun, Larsen, Christian P, Adams, Andrew B

    Published in The Journal of clinical investigation (01-10-2018)
    “…Interrupting T cell costimulatory signals as a strategy to control undesired immune responses, such as occur in autoimmunity or transplantation, has the…”
    Get full text
    Journal Article
  5. 5

    Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism by Chiasson, S., Stobert, E., Forget, A., Biddle, R., Van Oorschot, P. C.

    “…This paper presents an integrated evaluation of the Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and…”
    Get full text
    Journal Article
  6. 6

    OmniShare: Encrypted Cloud Storage for the Multi-Device Era by Paverd, Andrew, Tamrakar, Sandeep, Nguyen, Hoang Long, Pendyala, Praveen, Nguyen, Duc Thien, Stobert, Elizabeth, Grondahl, Tommi, Asokan, N., Sadeghi, Ahmad-Reza

    Published in IEEE internet computing (26-03-2018)
    “…Two attractive features of cloud storage services are the automatic synchronization of files between multiple client devices and the possibility to share files…”
    Get full text
    Journal Article
  7. 7

    OmniShare: Encrypted Cloud Storage for the Multi-Device Era by Paverd, Andrew, Tamrakar, Sandeep, Nguyen, Hoang Long, Pendyala, Praveen, Nguyen, Thien Duc, Stobert, Elizabeth, Grondahl, Tommi, Asokan, N., Sadeghi, Ahmad-Reza

    Published in IEEE internet computing (01-07-2018)
    “…Two attractive features of cloud storage services are (1) the automatic synchronization of files between multiple devices and (2) the possibility of sharing…”
    Get full text
    Journal Article
  8. 8

    "I don't really give them piece of mind": User Perceptions of Social Engineering Attacks by Kyi, Lin, Stobert, Elizabeth

    “…How do end users understand social engineering attacks, and how do their perceptions of these attacks differ from reality? To investigate, we proposed a new…”
    Get full text
    Conference Proceeding
  9. 9

    A first look at the usability of bitcoin key management by Eskandari, Shayan, Clark, Jeremy, Barrera, David, Stobert, Elizabeth

    Published 12-02-2018
    “…Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has a number of security and usability challenges that differ from…”
    Get full text
    Journal Article
  10. 10

    Exploring Website Location as a Security Indicator by Yu, Der-Yeuan, Stobert, Elizabeth, Basin, David, Capkun, Srdjan

    Published 12-10-2016
    “…Authenticating websites is an ongoing problem for users. Recent proposals have suggested strengthening current server authentication methods by incorporating…”
    Get full text
    Journal Article
  11. 11

    Visual end-user security by Stobert, E., Biddle, R.

    “…In our work, we examine ways to apply work on graphical passwords to password management and other aspects of web security. We hope that applying knowledge…”
    Get full text
    Conference Proceeding
  12. 12

    OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices by Paverd, Andrew, Tamrakar, Sandeep, Nguyen, Hoang Long, Pendyala, Praveen Kumar, Nguyen, Thien Duc, Stobert, Elizabeth, Gröndahl, Tommi, Asokan, N, Sadeghi, Ahmad-Reza

    Published 06-11-2015
    “…Cloud storage services like Dropbox and Google Drive are widely used by individuals and businesses. Two attractive features of these services are 1) the…”
    Get full text
    Journal Article
  13. 13

    Teaching Authentication as a Life Skill by Stobert, Elizabeth, Cavar, Elizabeta, Malisa, Luka, Sommer, David

    Published in IEEE security & privacy (01-09-2018)
    “…As more and more of the activities of daily living move into the digital realm, the importance of securing those activities grows. Where once an understanding…”
    Get full text
    Magazine Article