The SCEAS System
Navigation Menu

Conferences in DBLP

(soups)
2009 (conf/soups/2009)


  1. Treat 'em like other devices: user authentication of multiple personal RFID tags. [Citation Graph (, )][DBLP]


  2. Ecological validity in studies of security and human behaviour. [Citation Graph (, )][DBLP]


  3. How users use access control. [Citation Graph (, )][DBLP]


  4. Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. [Citation Graph (, )][DBLP]


  5. Graphical passwords as browser extension: implementation and usability study. [Citation Graph (, )][DBLP]


  6. Ubiquitous systems and the family: thoughts about the networked home. [Citation Graph (, )][DBLP]


  7. It's not what you know, but who you know: a social approach to last-resort authentication. [Citation Graph (, )][DBLP]


  8. Redirects to login pages are bad, or are they? [Citation Graph (, )][DBLP]


  9. Threshold things that think: usable authorization for resharing. [Citation Graph (, )][DBLP]


  10. Machine learning attacks against the Asirra CAPTCHA. [Citation Graph (, )][DBLP]


  11. It's no secret: measuring the security and reliability of authentication via 'secret' questions. [Citation Graph (, )][DBLP]


  12. Usability and security of out-of-band channels in secure device pairing protocols. [Citation Graph (, )][DBLP]


  13. Revealing hidden context: improving mental models of personal firewall users. [Citation Graph (, )][DBLP]


  14. Integrating usability and accessibility in information assurance education. [Citation Graph (, )][DBLP]


  15. Privacy suites: shared privacy for social networks. [Citation Graph (, )][DBLP]


  16. Analyzing use of privacy policy attributes in a location sharing application. [Citation Graph (, )][DBLP]


  17. Recall-a-story, a story-telling graphical password system. [Citation Graph (, )][DBLP]


  18. A user study of the expandable grid applied to P3P privacy policy visualization. [Citation Graph (, )][DBLP]


  19. A "nutrition label" for privacy. [Citation Graph (, )][DBLP]


  20. Short and long term research suggestions for NSF and NIST. [Citation Graph (, )][DBLP]


  21. Technology transfer of successful usable security research into product. [Citation Graph (, )][DBLP]


  22. Textured agreements: re-envisioning electronic consent. [Citation Graph (, )][DBLP]


  23. Studying location privacy in mobile applications: 'predator vs. prey' probes. [Citation Graph (, )][DBLP]


  24. School of phish: a real-word evaluation of anti-phishing training. [Citation Graph (, )][DBLP]


  25. New directions in multisensory authentication. [Citation Graph (, )][DBLP]


  26. The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. [Citation Graph (, )][DBLP]


  27. A multi-method approach for user-centered design of identity management systems. [Citation Graph (, )][DBLP]


  28. Conditioned-safe ceremonies and a user study of an application to web authentication. [Citation Graph (, )][DBLP]


  29. Personal choice and challenge questions: a security and usability assessment. [Citation Graph (, )][DBLP]


  30. Usable deidentification of sensitive patient care data. [Citation Graph (, )][DBLP]


  31. Designing for different levels of social inference risk. [Citation Graph (, )][DBLP]


  32. A comparative study of online privacy policies and formats. [Citation Graph (, )][DBLP]


  33. Designing and evaluating usable security and privacy technology. [Citation Graph (, )][DBLP]


  34. 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentication. [Citation Graph (, )][DBLP]


  35. Balancing usability and security in a video CAPTCHA. [Citation Graph (, )][DBLP]


  36. Social applications: exploring a more secure framework. [Citation Graph (, )][DBLP]


  37. Privacy stories: confidence in privacy behaviors through end user programming. [Citation Graph (, )][DBLP]


  38. Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and security. [Citation Graph (, )][DBLP]


  39. How does the emergence of reputation mechanisms affect the overall trust formation mechanisms, implicit and explicit, in the online environment? [Citation Graph (, )][DBLP]


  40. The impact of privacy indicators on search engine browsing patterns. [Citation Graph (, )][DBLP]


  41. Look into my eyes!: can you guess my password? [Citation Graph (, )][DBLP]


  42. Escape from the matrix: lessons from a case-study in access-control requirements. [Citation Graph (, )][DBLP]


  43. A new graphical password scheme against spyware by using CAPTCHA. [Citation Graph (, )][DBLP]


  44. Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP]


  45. Think Evil (tm). [Citation Graph (, )][DBLP]


  46. The family and communication technologies. [Citation Graph (, )][DBLP]


  47. Not one click for security? [Citation Graph (, )][DBLP]


  48. Sanitization's slippery slope: the design and study of a text revision assistant. [Citation Graph (, )][DBLP]


  49. BayeShield: conversational anti-phishing user interface. [Citation Graph (, )][DBLP]


  50. Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? [Citation Graph (, )][DBLP]


  51. Games for extracting randomness. [Citation Graph (, )][DBLP]


  52. Challenges in supporting end-user privacy and security management with social navigation. [Citation Graph (, )][DBLP]


  53. Serial hook-ups: a comparative usability study of secure device pairing methods. [Citation Graph (, )][DBLP]


  54. flyByNight: mitigating the privacy risks of social networking. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002