Eiji Hayashi
Eiji Hayashi
Google
hayashi.io üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Use your illusion: secure authentication usable anywhere
E Hayashi, R Dhamija, N Christin, A Perrig
Proceedings of the 4th symposium on Usable privacy and security, 35-45, 2008
1782008
CASA: context-aware scalable authentication
E Hayashi, S Das, S Amini, J Hong, I Oakley
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-10, 2013
1622013
Undercover: authentication usable in front of prying eyes
H Sasamoto, N Christin, E Hayashi
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1472008
A diary study of password usage in daily life
E Hayashi, J Hong
Proceedings of the 2011 annual conference on Human factors in computing …, 2011
1312011
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications
E Hayashi, O Riva, K Strauss, AJB Brush, S Schechter
Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-11, 2012
912012
Wave to me: user identification using body lengths and natural gestures
E Hayashi, M Maas, JI Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
492014
Exploring capturable everyday memory for autobiographical authentication
S Das, E Hayashi, JI Hong
Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013
422013
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes
E Hayashi, J Hong, N Christin
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
302011
Device locking with hierarchical activity preservation
S Schechter, AJB Brush, O Riva, K Strauss, E Hayashi
US Patent 8,732,822, 2014
232014
WebTicket: Account Management Using Printable Tokens
E Hayashi, B Pendleton, F Ozenc, J Hong
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
232012
TimeBlocks: "Mom, Can I Have Another Block of Time?"
E Hayashi, M Rau, ZH Neo, N Tan, S Ramasubramanian, E Paulos
Proceedings of the 2012 ACM annual conference on Human Factors in Computing …, 2012
102012
New directions in multisensory authentication.
M Hasegawa, N Christin, E Hayashi
SOUPS, 2009
92009
Investigating collaborative mobile search behaviors
S Amini, V Setlur, Z Xi, E Hayashi, J Hong
Proceedings of the 15th international conference on Human-computer …, 2013
72013
Knock x knock: the design and evaluation of a unified authentication management system
E Hayashi, JI Hong
Proceedings of the 2015 ACM International Joint Conference on Pervasive and …, 2015
52015
Mental trapdoors for user authentication on small mobile devices
E Hayashi, N Christin, R Dhamija, A Perrig
52007
Smartphone-based radar system for determining user intention in a lower-power mode
L Giusti, I Poupyrev, E Hayashi, PM Amihood
US Patent 10,788,880, 2020
32020
Radar-image shaper for radar-based applications
L Giusti, I Poupyrev, E Hayashi, PM Amihood, B Allen
US Patent 10,761,611, 2020
22020
A design guide-line of auditory display for electric appliance
T Komatsu, E Hayashi
Georgia Institute of Technology, 2019
22019
It's Hidden in My Computer": Exploring Account Management Tools and Behaviors
E Hayashi, J Hong
CMU-CyLab-13-007, 2013
22013
Evaluating the use of autobiographical memory for authentication
S Das, E Hayashi, JI Hong, I Oakley
Symposium On Usable Privacy and Security (SOUPS), 2012
22012
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20