2009 |
11 | EE | Amy K. Karlson,
A. J. Bernheim Brush,
Stuart E. Schechter:
Can I borrow your phone?: understanding concerns when sharing mobile phones.
CHI 2009: 1647-1650 |
10 | EE | Stuart E. Schechter,
Serge Egelman,
Robert W. Reeder:
It's not what you know, but who you know: a social approach to last-resort authentication.
CHI 2009: 1983-1992 |
2007 |
9 | EE | Stuart E. Schechter,
Rachna Dhamija,
Andy Ozment,
Ian Fischer:
The Emperor's New Security Indicators.
IEEE Symposium on Security and Privacy 2007: 51-65 |
2006 |
8 | EE | Stuart E. Schechter,
Jaeyeon Jung,
Will Stockwell,
Cynthia D. McLain:
Inoculating SSH Against Address Harvesting.
NDSS 2006 |
2005 |
7 | EE | Stuart E. Schechter:
Toward Econometric Models of the Security Risk from Remote Attack.
IEEE Security & Privacy 3(1): 40-44 (2005) |
2004 |
6 | EE | Stuart E. Schechter,
Jaeyeon Jung,
Arthur W. Berger:
Fast Detection of Scanning Worm Infections.
RAID 2004: 59-81 |
2003 |
5 | EE | Stuart E. Schechter,
Michael D. Smith:
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks.
Financial Cryptography 2003: 122-137 |
4 | EE | Stuart E. Schechter,
Michael D. Smith:
Access for sale: a new class of worm.
WORM 2003: 19-23 |
2002 |
3 | EE | Stuart E. Schechter:
How to Buy Better Testing.
InfraSec 2002: 73-87 |
1999 |
2 | EE | Stuart E. Schechter,
Todd Parnell,
Alexander J. Hartemink:
Anonymous Authentication of Membership in Dynamic Groups.
Financial Cryptography 1999: 184-195 |
1998 |
1 | EE | Stuart E. Schechter,
Murali Krishnan,
Michael D. Smith:
Using Path Profiles to Predict HTTP Requests.
Computer Networks 30(1-7): 457-467 (1998) |