Tara Whalen
发表
Tara Whalen,
Carrie Gates,
C. Gates,
2010,
Inf. Manag. Comput. Secur..
Konstantin Beznosov,
Mary Ellen Zurko,
Tara Whalen,
2013
.
Tara Whalen,
Carrie Gates,
C. Gates,
2009,
HAISA.
Tara Whalen,
2011,
IEEE Security & Privacy.
Tara Whalen,
2011,
IEEE Security & Privacy.
Diana K. Smetters,
Elizabeth F. Churchill,
Tara Whalen,
2006,
CHI EA '06.
Regan L. Mandryk,
Kirstie Hawkey,
Stacey D. Scott,
2005
.
Kori Inkpen Quinn,
Kirstie Hawkey,
Bonnie MacKay,
2005,
CHI EA '05.
Tara Whalen,
Carrie Gates,
C. Gates,
2007,
J. Comput..
Robert Biddle,
Tara Whalen,
Paul C. van Oorschot,
2011,
IEEE Transactions on Information Forensics and Security.
Tara Whalen,
James P. Black,
1999,
Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
Tara Whalen,
Gregory G. Rose,
Damian Bentley,
1999,
LISA.
Tara Whalen,
2010,
CCS 2010.
Elaine Toms,
James Blustein,
Tara Whalen,
2008,
CHiMiT '08.
Tara Whalen,
2012,
IEEE Security & Privacy.
Pamela J. Wisniewski,
Nathaniel Good,
Jennifer King,
2016,
CHI Extended Abstracts.
Tara Whalen,
2008
.
Tara Whalen,
Carrie Gates,
C. Gates,
2006,
WISI.
Mary Ellen Zurko,
Tara Whalen,
Cormac Herley,
2010,
NSPW 2012.
Regan L. Mandryk,
Kori Inkpen Quinn,
Tara Whalen,
2006,
First IEEE International Workshop on Horizontal Interactive Human-Computer Systems (TABLETOP '06).
Kori Inkpen Quinn,
Kirstie Hawkey,
Tara Whalen,
2005,
GROUP.
Tara Whalen,
1997
.
Kori Inkpen Quinn,
Tara Whalen,
K. Quinn,
2005,
Graphics Interface.
Tara Whalen,
Carrie Gates,
C. Gates,
2004,
NSPW '04.
Robert Biddle,
Tara Whalen,
Paul C. van Oorschot,
2009,
CCSW '09.
Tara Whalen,
2011
.
The Usable Security of Passwords based on Digital Objects : From Design and Analysis to User Study ∗
Robert Biddle,
Tara Whalen,
Mohammad Mannan,
2010
.
Kirstie Hawkey,
Tara Whalen,
Derek Reilly,
2004
.
Tara Whalen,
2005
.