2008 |
7 | EE | Chia-Hsin Owen Chen,
Chung-Wei Chen,
Cynthia Kuo,
Yan-Hao Lai,
Jonathan M. McCune,
Ahren Studer,
Adrian Perrig,
Bo-Yin Yang,
Tzong-Chen Wu:
GAnGS: gather, authenticate 'n group securely.
MOBICOM 2008: 92-103 |
6 | EE | Cynthia Kuo,
Ahren Studer,
Adrian Perrig:
Mind your manners: socially appropriate wireless key establishment for groups.
WISEC 2008: 125-130 |
2007 |
5 | EE | Cynthia Kuo,
Jesse Walker,
Adrian Perrig:
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Financial Cryptography 2007: 325-340 |
4 | EE | Cynthia Kuo,
Mark Luk,
Rohit Negi,
Adrian Perrig:
Message-in-a-bottle: user-friendly and secure key deployment for sensor nodes.
SenSys 2007: 233-246 |
2006 |
3 | EE | Bryan Parno,
Cynthia Kuo,
Adrian Perrig:
Phoolproof Phishing Prevention.
Financial Cryptography 2006: 1-19 |
2 | EE | Cynthia Kuo,
Sasha Romanosky,
Lorrie Faith Cranor:
Human selection of mnemonic phrase-based passwords.
SOUPS 2006: 67-78 |
1 | EE | Cynthia Kuo,
Adrian Perrig,
Jesse Walker:
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Interactions 13(3): 28-31 (2006) |