2009 |
11 | EE | Stuart E. Schechter,
Serge Egelman,
Robert W. Reeder:
It's not what you know, but who you know: a social approach to last-resort authentication.
CHI 2009: 1983-1992 |
10 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
Real life challenges in access-control management.
CHI 2009: 899-908 |
2008 |
9 | EE | Robert W. Reeder,
Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kelli Bacon,
Keisha How,
Heather Strong:
Expandable grids for visualizing and authoring computer security policies.
CHI 2008: 1473-1482 |
8 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
A user study of policy creation in a flexible access-control system.
CHI 2008: 543-552 |
7 | EE | Robert W. Reeder,
Patrick Gage Kelley,
Aleecia M. McDonald,
Lorrie Faith Cranor:
A user study of the expandable grid applied to P3P privacy policy visualization.
WPES 2008: 45-54 |
2007 |
6 | EE | Robert W. Reeder,
Clare-Marie Karat,
John Karat,
Carolyn Brodie:
Usability Challenges in Security and Privacy Policy-Authoring Interfaces.
INTERACT (2) 2007: 141-155 |
2006 |
5 | EE | Robert W. Reeder,
Roy A. Maxion:
User Interface Defect Detection by Hesitation Analysis.
DSN 2006: 61-72 |
2005 |
4 | EE | Robert W. Reeder,
Roy A. Maxion:
User Interface Dependability through Goal-Error Prevention.
DSN 2005: 60-69 |
3 | EE | Robert W. Reeder,
Fahd Arshad:
Soups 2005.
IEEE Security & Privacy 3(5): 47-50 (2005) |
2 | EE | Roy A. Maxion,
Robert W. Reeder:
Improving user-interface dependability through mitigation of human error.
International Journal of Man-Machine Studies 63(1-2): 25-50 (2005) |
2001 |
1 | EE | Stuart K. Card,
Peter Pirolli,
Mija M. Van Der Wege,
Julie Bauer Morrison,
Robert W. Reeder,
Pamela K. Schraedley,
Jenea Boshart:
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability.
CHI 2001: 498-505 |