Cynthia Kuo
According to our database1,
Cynthia Kuo
authored at least 20 papers
between 2006 and 2014.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2014
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014
2013
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
MARS: a muscle activity recognition system enabling self-configuring musculoskeletal sensor networks.
Proceedings of the 12th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2013), 2013
2012
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012
Proceedings of the Distributed Computing and Internet Technology, 2012
2011
Proceedings of the 5th International Conference on Pervasive Computing Technologies for Healthcare, 2011
2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, 2010
2009
Designing user studies for security applications: a case study with wireless network configuration.
Int. J. Secur. Networks, 2009
2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, 2008
2007
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup.
Proceedings of the Financial Cryptography and Data Security, 2007
2006
Designing an evaluation method for security user interfaces: lessons from studying secure wireless network configuration.
Interactions, 2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
Proceedings of the Financial Cryptography and Data Security, 2006