Crawling online social graphs S Ye, J Lang, F Wu 2010 12th International Asia-Pacific Web Conference, 236-242, 2010 | 179 | 2010 |
Security keys: Practical cryptographic second factors for the modern web J Lang, A Czeskis, D Balfanz, M Schilder, S Srinivas Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 82 | 2017 |
Fido nfc protocol specification v1. 0 A Czeskis, J Lang FIDO Alliance Proposed Standard, 1-5, 2015 | 32 | 2015 |
FIDO U2F Javascript API D Balfanz, A Birgisson, J Lang Methods 4, U2F, 2013 | 32 | 2013 |
Social manipulation of online recommender systems J Lang, M Spear, SF Wu Social Informatics: Second International Conference, SocInfo 2010, Laxenburg …, 2010 | 27 | 2010 |
Social network user lifetime J Lang, SF Wu Social Network Analysis and Mining 3, 285-297, 2013 | 19 | 2013 |
New directions in social authentication S Jain, J Lang, NZ Gong, D Song, S Basuroy, P Mittal Proceedings of the Workshop on Usable Security, 2015 | 13 | 2015 |
Anti-preferential attachment: If I follow you, will you follow me? J Lang, SF Wu 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 12 | 2011 |
Messagereaper: Using social behavior to reduce malicious activity in networks M Spear, J Lang, X Lu, N Matloff, SF Wu Computer Science, UC Davis, Techincal Report CSE-2007-9, 2008 | 5 | 2008 |
Encouraging User Engagement with Online Social Networks J Lang University of California, Davis, 2011 | 3 | 2011 |