Sanchari Das
Orcid: 0000-0003-1299-7867
According to our database1,
Sanchari Das
authored at least 83 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Comput. Heal., April, 2024
Dual-Technique Privacy & Security Analysis for E-Commerce Websites Through Automated and Manual Implementation.
CoRR, 2024
CoRR, 2024
Design of Secure, Privacy-focused, and Accessible E-Payment Applications for Older Adults.
CoRR, 2024
Understanding Professional Needs to Create Privacy-Preserving and Secure Emergent Digital Artworks.
CoRR, 2024
Towards Perceived Security, Perceived Privacy, and the Universal Design of E-Payment Applications.
CoRR, 2024
Closed Form Expression of Input Matching of a Wideband Single-Ended to Differential LNA.
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024
"I really just leaned on my community for support": Barriers, Challenges and Coping Mechanisms Used by Survivors of Technology-Facilitated Abuse to Seek Social Support.
Proceedings of the 33rd USENIX Security Symposium, 2024
'Debunk-It-Yourself': Health Professionals Strategies for Responding to Misinformation on TikTok.
Proceedings of the New Security Paradigms Workshop, 2024
Systematic Design of Ring VCO-Based SNN - Translating Training Parameters to Circuits -.
Proceedings of the 67th IEEE International Midwest Symposium on Circuits and Systems, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the Information Systems Security - 20th International Conference, 2024
Evaluating Privacy & Security of Online Dating Applications with a Focus on Older Adults.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
"We Have No Security Concerns": Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists: Understanding the Privacy-Security Nexus in Telehealth.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
A Critical Analysis of the Prevalence of Technology-Facilitated Abuse in US College Students.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades.
Proc. Priv. Enhancing Technol., July, 2023
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum. Comput. Interact., April, 2023
Cybersecurity, Safety, & Privacy Concerns of Student Support Structure for Information and Communication Technologies in Online Education.
Proc. ACM Hum. Comput. Interact., 2023
CoRR, 2023
Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives.
CoRR, 2023
SoK: Evaluating Privacy and Security Concerns of Using Web Services for the Disabled Population.
CoRR, 2023
CoRR, 2023
Blockchain in Oil and Gas Supply Chain: A Literature Review from User Security and Privacy Perspective.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications.
Proceedings of the 2023 European Symposium on Usable Security, 2023
Proceedings of the 16th International Conference on Educational Data Mining, 2023
Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
A Proposal to Study Shoulder-Surfing Resistant Authentication for Augmented and Virtual Reality: Replication Study in the US.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees' Current Practices.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
SoK: An Evaluation of the Secure End User Experience on the Dark Net through Systematic Literature Review.
J. Cybersecur. Priv., May, 2022
Exploring gender biases in ML and AI academic research through systematic literature review.
Frontiers Artif. Intell., 2022
Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Understanding User Perspective in a University Setting to Improve Biometric Authentication Adoption.
Proceedings of the 9th Mexican International Conference on Human-Computer Interaction, 2022
Challenges and Future Directions in the Implementation of Quantum Authentication Protocols.
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Does This Photo Make Me Look Good?: How Social Media Feedback on Photos Impacts Posters, Outsiders, and Friends.
Proc. ACM Hum. Comput. Interact., 2021
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review.
Comput. Animat. Virtual Worlds, 2021
Bayesian evaluation of privacy-preserving risk communication for user android app preferences.
Inf. Comput. Secur., 2021
Location Data and COVID-19 Contact Tracing: How Data Privacy Regulations and Cell Service Providers Work In Tandem.
CoRR, 2021
Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks.
Proceedings of the 2021 IEEE SmartWorld, 2021
SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021
Understanding the Rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Human Aspects of Information Security and Assurance, 2021
Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption.
Proceedings of the Financial Cryptography and Data Security, 2021
SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures.
Proceedings of the Emerging Information Security and Applications, 2021
Parents, Educators, & Caregivers Cybersecurity & Privacy Concerns for Remote Learning During COVID-19.
Proceedings of the CHI Greece 2021: 1st International Conference of the ACM Greek SIGCHI Chapter, virtual Event / Athens, Greece, November 25, 2021
2020
CoRR, 2020
Towards Secure and Usable Authentication for Augmented and Virtual Reality Head-Mounted Displays.
CoRR, 2020
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the EICC 2020: European Interdisciplinary Cybersecurity Conference, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
Substituting Restorative Benefits of Being Outdoors through Interactive Augmented Spatial Soundscapes.
Proceedings of the ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility, 2020
2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 2018
Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key.
Proceedings of the Financial Cryptography and Data Security, 2018
2017
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017
How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement.
Proceedings of the 8th International Conference on Social Media & Society, 2017
Dynamic Economic Emission Dispatch using self-adaptive multivariate distribution based modified Real Coded Genetic Algorithm.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Discrete Wavelet Transform based V-I image fusion with Artificial Bee Colony Optimization.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017