Joshua Reynolds
Joshua Reynolds
Email confirmado em - Página inicial
Citado por
Citado por
A tale of two studies: The best and worst of yubikey usability
J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons
2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018
TrustBase: An architecture to repair and strengthen certificate-based authentication
M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 609-624, 2017
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Empirical measurement of systemic 2fa usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
29th {USENIX} Security Symposium ({USENIX} Security 20), 127-143, 2020
The impact of secure transport protocols on phishing efficacy
Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ...
12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19), 2019
A Usability Study of Secure Email Deletion
T Monson, S Ruoti, J Reynolds, D Zappala, T Smith, K Seamons
European Workshop on Usable Security, 2018
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–6