Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Why phishing works
- Rachna Dhamija, J. Tygar, Marti A. Hearst
- Computer ScienceCHI
- 22 April 2006
TLDR
Deja Vu-A User Study: Using Images for Authentication
- Rachna Dhamija, A. Perrig
- Computer ScienceUSENIX Security Symposium
- 14 August 2000
TLDR
The battle against phishing: Dynamic Security Skins
- Rachna Dhamija, J. Tygar
- Computer ScienceSOUPS '05
- 6 July 2005
TLDR
The Emperor's New Security Indicators
- Stuart E. Schechter, Rachna Dhamija, A. Ozment, Ian S. Fischer
- Computer ScienceIEEE Symposium on Security and Privacy (SP '07)
- 20 May 2007
TLDR
The Seven Flaws of Identity Management: Usability and Security Challenges
- Rachna Dhamija, L. Dusseault
- Computer ScienceIEEE Security & Privacy
- 1 March 2008
TLDR
Use Your Illusion: secure authentication usable anywhere
- Eiji Hayashi, Rachna Dhamija, Nicolas Christin, A. Perrig
- Computer ScienceSOUPS '08
- 23 July 2008
TLDR
Stopping spyware at the gate: a user study of privacy, notice and spyware
- Nathaniel Good, Rachna Dhamija, J. Konstan
- Computer ScienceSOUPS '05
- 6 July 2005
TLDR
Animated exploration of dynamic graphs with radial layout
- K. Yee, Danyel Fisher, Rachna Dhamija, Marti A. Hearst
- Computer ScienceIEEE Symposium on Information Visualization…
- 22 October 2001
TLDR
The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies †
- Stuart E. Schechter, Rachna Dhamija, A. Ozment, I. Fischer
- Computer Science
- 1 May 2007
TLDR
Hash visualization in user authentication
- Rachna Dhamija
- Computer ScienceCHI Extended Abstracts
- 1 April 2000
TLDR
...
...