Articles with public access mandates - Joshua ReynoldsLearn more
Not available anywhere: 1
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations
J Reynolds, A Bates, M Bailey
European Symposium on Research in Computer Security, 166-185, 2022
Mandates: US National Science Foundation
Available somewhere: 6
A tale of two studies: The best and worst of yubikey usability
J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons
2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018
Mandates: US National Science Foundation, US Department of Energy
Empirical Measurement of Systemic {2FA} Usability
J Reynolds, N Samarin, J Barnes, T Judd, J Mason, M Bailey, S Egelman
29th USENIX Security Symposium (USENIX Security 20), 127-143, 2020
Mandates: US National Science Foundation
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Mandates: US National Science Foundation
{TrustBase}: An architecture to repair and strengthen certificate-based authentication
M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ...
26th USENIX Security Symposium (USENIX Security 17), 609-624, 2017
Mandates: US National Science Foundation, US Department of Energy
The impact of secure transport protocols on phishing efficacy
Z Ma, J Reynolds, J Dickinson, K Wang, T Judd, JD Barnes, J Mason, ...
12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019
Mandates: US National Science Foundation
A Usability Study of Secure Email Deletion
T Monson, S Ruoti, J Reynolds, D Zappala, T Smith, K Seamons
European Workshop on Usable Security, 2018
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program