Stuart E. Schechter
Affiliations:- Microsoft Research
According to our database1,
Stuart E. Schechter
authored at least 40 papers
between 1998 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2020
IEEE Secur. Priv., 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2016
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns.
IACR Cryptol. ePrint Arch., 2016
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
2013
Your attention please: designing security-decision UIs to make genuine risks harder to ignore.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
Goldilocks and the <i>two</i> mobile devices: going beyond all-or-nothing access to a device's applications.
Proceedings of the Symposium On Usable Privacy and Security, 2012
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IEEE Secur. Priv., 2011
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Security That Is Meant to Be Skin Deep: Using Ultraviolet Micropigmentation to Store Emergency-Access Keys for Implantable Medical Devices.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), 2010
2009
It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
It's not what you know, but who you know: a social approach to last-resort authentication.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Laissez-faire file sharing: access control designed for individuals at the endpoints.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the Network and Distributed System Security Symposium, 2006
2005
IEEE Secur. Priv., 2005
2004
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment.
Proceedings of the Economics of Information Security, 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
2003
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks.
Proceedings of the Financial Cryptography, 2003
2002
Proceedings of the Infrastructure Security, International Conference, 2002
1999
Proceedings of the Financial Cryptography, 1999
1998