


default search action
SOUPS 2007: Pittsburgh, PA, USA
- Lorrie Faith Cranor:

Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007. ACM International Conference Proceeding Series 229, ACM 2007, ISBN 978-1-59593-801-5
Passwords
- Sonia Chiasson, Robert Biddle, Paul C. van Oorschot

:
A second look at the usability of click-based graphical passwords. 1-12 - Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd:

Reducing shoulder-surfing by using gaze-based password entry. 13-19 - Ahmet Emir Dirik, Nasir D. Memon

, Jean-Camille Birget:
Modeling user choice in the PassPoints graphical password scheme. 20-28
Privacy and access control
- Carlos Jensen, Chandan Sarkar, Christian Jensen

, Colin Potts:
Tracking website data-collection and privacy practices with the iWatch web crawler. 29-40 - Jeremy Clark, Paul C. van Oorschot

, Carlisle Adams:
Usability of anonymous web browsing: an examination of Tor interfaces and deployability. 41-51 - Balachander Krishnamurthy, Delfina Malandrino

, Craig E. Wills:
Measuring privacy loss and the impact of privacy protection in web browsing. 52-63 - Lujo Bauer

, Lorrie Faith Cranor
, Michael K. Reiter, Kami Vaniea
:
Lessons learned from the deployment of a smartphone-based access-control system. 64-75
Training and such
- José Carlos Brustoloni, Ricardo Villamarín-Salomón:

Improving security decisions with polymorphic and audited dialogs. 76-85 - Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti

, Lorrie Faith Cranor
, Jason I. Hong
, Elizabeth Nunge:
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. 88-99 - David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney S. Fels

, Brian D. Fisher
:
Towards understanding IT security professionals and their tools. 100-111
SOUPS du jour
- Gregory J. Conti, Edward Sobiesk:

An honest man has nothing to fear: user perceptions on web-based information disclosure. 112-121 - Eric Lieberman, Robert C. Miller:

Facemail: showing faces of recipients to prevent misdirected email. 122-131 - Ivan Krstic, Simson L. Garfinkel

:
Bitfrost: the one laptop per child security model. 132-142
Posters
- Rajah James, Woo Tae Kim, Aleecia M. McDonald, Robert McGuire:

A usability evaluation of a home monitoring system. 143-144 - John Bethencourt, Wai Yong Low, Isaac Simmons, Matthew Williamson:

Establishing darknet connections: an evaluation of usability and security. 145-146 - Johnny Lim:

Defeat spyware with anti-screen capture technology using visual persistence. 147-148 - Rodrigo Werlinger, David Botta, Konstantin Beznosov:

Detecting, analyzing and responding to security incidents: a qualitative analysis. 149-150 - Alain Forget, Sonia Chiasson, Robert Biddle:

Helping users create better passwords: is this the right approach? 151-152 - Rosa R. Heckle, Andrew S. Patrick, A. Ant Ozok:

Perception and acceptance of fingerprint biometric technology. 153-154 - Andreas P. Heiner, N. Asokan

:
Secure software installation in a mobile environment. 155-156 - Katherine Strater, Heather Richter:

Examining privacy and disclosure in a social networking community. 157-158 - Robert L. Marchant:

A survey of privacy concerns with dynamic collaborator discovery capabilities. 159-160 - Di Lin, Paul Dunphy, Patrick Olivier

, Jeff Yan:
Graphical passwords & qualitative spatial relations. 161-162 - Matthew Edman, Justin Hipple:

Vidalia: towards a usable Tor GUI. 163-164 - Paul Dunphy, Jeff Yan:

Is FacePIN secure and usable? 165-166 - Joshua B. Gross, Mary Beth Rosson:

End user concern about security and privacy threats. 167-168 - Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith:

TwoKind authentication: usable authenticators for untrustworthy environments. 169-170 - Sara Motahari, Constantine N. Manikopoulos, Starr Roxanne Hiltz, Quentin Jones:

Seven privacy worries in ubiquitous social computing. 171-172 - Rosa R. Heckle, Wayne G. Lutters:

Privacy implications for single sign-on authentication in a hospital environment. 173-174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














