Use your illusion: secure authentication usable anywhere E Hayashi, R Dhamija, N Christin, A Perrig Proceedings of the 4th Symposium on Usable Privacy and Security, 35-45, 2008 | 196 | 2008 |
Casa: context-aware scalable authentication E Hayashi, S Das, S Amini, J Hong, I Oakley Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-10, 2013 | 194 | 2013 |
Undercover: authentication usable in front of prying eyes H Sasamoto, N Christin, E Hayashi Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008 | 153 | 2008 |
A diary study of password usage in daily life E Hayashi, J Hong Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011 | 144 | 2011 |
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications E Hayashi, O Riva, K Strauss, AJB Brush, S Schechter Proceedings of the Eighth Symposium on Usable Privacy and Security, 1-11, 2012 | 103 | 2012 |
Wave to me: user identification using body lengths and natural gestures E Hayashi, M Maas, JI Hong Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 55 | 2014 |
Exploring capturable everyday memory for autobiographical authentication S Das, E Hayashi, JI Hong Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013 | 46 | 2013 |
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes E Hayashi, J Hong, N Christin Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011 | 34 | 2011 |
Device locking with hierarchical activity preservation S Schechter, AJB Brush, O Riva, K Strauss, E Hayashi US Patent 8,732,822, 2014 | 30 | 2014 |
WebTicket: Account management using printable tokens E Hayashi, B Pendleton, F Ozenc, J Hong Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012 | 26 | 2012 |
RadarNet: Efficient gesture recognition technique utilizing a miniature radar sensor E Hayashi, J Lien, N Gillian, L Giusti, D Weber, J Yamanaka, L Bedal, ... Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems …, 2021 | 19 | 2021 |
TimeBlocks: Mom, can I have another block of time E Hayashi, M Rau, ZH Neo, N Tan, S Ramasubramanian, E Paulos Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012 | 13 | 2012 |
Smartphone-based radar system for determining user intention in a lower-power mode L Giusti, I Poupyrev, E Hayashi, PM Amihood US Patent 10,788,880, 2020 | 12 | 2020 |
Seamless authentication using radar B Barbello, L Giusti, I Poupyrev, E Hayashi US Patent 10,725,161, 2020 | 10 | 2020 |
Radar-image shaper for radar-based applications L Giusti, I Poupyrev, E Hayashi, PM Amihood, B Allen US Patent 10,761,611, 2020 | 9 | 2020 |
Investigating collaborative mobile search behaviors S Amini, V Setlur, Z Xi, E Hayashi, J Hong Proceedings of the 15th international conference on Human-computer …, 2013 | 9 | 2013 |
New directions in multisensory authentication. M Hasegawa, N Christin, E Hayashi SOUPS, 2009 | 9 | 2009 |
Knock x knock: the design and evaluation of a unified authentication management system E Hayashi, JI Hong Proceedings of the 2015 ACM International Joint Conference on Pervasive and …, 2015 | 7 | 2015 |
Mental trapdoors for user authentication on small mobile devices E Hayashi, N Christin, R Dhamija, A Perrig | 5 | 2007 |
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. E Hayashi, JI Hong, N Christin SOUPS, 2009 | 4 | 2009 |