Sanchari Das
Cited by
Cited by
Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key
S Das, A Dingman, LJ Camp
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
Evaluating user perception of multi-factor authentication: a systematic review
S Das, B Wang, Z Tingle, LJ Camp
arXiv preprint arXiv:1908.05901, 2019
All about phishing: Exploring user research through a systematic literature review
S Das, A Kim, Z Tingle, C Nippert-Eng
arXiv preprint arXiv:1908.05897, 2019
A qualitative study on usability and acceptability of yubico security key
S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
Evaluating the impact of covid-19 on cyberbullying through bayesian trend analysis
S Karmakar, S Das
Proceedings of the European Interdisciplinary Cybersecurity Conference, 1-6, 2020
Towards implementing inclusive authentication technologies for older adults
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Who Are You, 2019
Change-point analysis of cyberbullying-related twitter discussions during covid-19
S Das, A Kim, S Karmakar
arXiv preprint arXiv:2008.13613, 2020
Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content
S Das, B Wang, LJ Camp
arXiv preprint arXiv:1908.05902, 2019
Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation
S Karmakar, S Das
Proceedings of the 54th Hawaii international conference on system sciences, 2021
User-centered risk communication for safer browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020
Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content
ASM Noman, S Das, S Patil
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
J Dev, S Das, LJ Camp
HAISA, 135-146, 2018
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review
N Noah, S Das
Computer Animation and Virtual Worlds 32 (3-4), e2020, 2021
Modularity is the key a new approach to social media privacy policies
S Das, J Dev, K Srinivasan
Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 1-4, 2018
How celebrities feed tweeples with personal and promotional tweets: celebrity twitter use and audience engagement
S Das, J Goard, D Murray
Proceedings of the 8th International Conference on Social Media & Society, 1-5, 2017
Towards secure and usable authentication for augmented and virtual reality head-mounted displays
R Duezguen, P Mayer, S Das, M Volkamer
arXiv preprint arXiv:2007.11663, 2020
Evaluating user susceptibility to phishing attacks
S Das, C Nippert-Eng, LJ Camp
Information & Computer Security, 2022
Why Don’t Older Adults Adopt Two-Factor Authentication?
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the …, 2020
Mfa is a necessary chore!: Exploring user mental models of multi-factor authentication technologies
S Das, B Wang, A Kim, LJ Camp
Personalized WhatsApp privacy: Demographic and cultural influences on Indian and Saudi users
J Dev, S Das, Y Rashidi, LJ Camp
Available at SSRN 3391021, 2019
The system can't perform the operation now. Try again later.
Articles 1–20