Stop the war!
Остановите войну!
for scientists:
default search action
SOUPS 2013: Newcastle, UK
- Lujo Bauer, Konstantin Beznosov, Lorrie Faith Cranor:
Symposium On Usable Privacy and Security, SOUPS '13, Newcastle, United Kingdom, July 24-26, 2013. ACM 2013, ISBN 978-1-4503-2319-2
Authentication and authorization
- Christopher Thompson, Maritza L. Johnson, Serge Egelman, David A. Wagner, Jennifer King:
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources. 1:1-1:14 - Matthias Beckerle, Leonardo A. Martucci:
Formal definitions for usable access control rule sets from goals to metrics. 2:1-2:11 - Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason I. Hong, Ian Oakley:
CASA: context-aware scalable authentication. 3:1-3:10
SOUPS de jour
- Oshrat Ayalon, Eran Toch:
Retrospective privacy: managing longitudinal privacy in online social networks. 4:1-4:13 - Scott Ruoti, Nathan Kim, Ben Burgon, Timothy W. van der Horst, Kent E. Seamons:
Confused Johnny: when automatic encryption leads to confusion and mistakes. 5:1-5:12 - Cristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W. Reeder, Manya Sleeper, Julie S. Downs, Stuart E. Schechter:
Your attention please: designing security-decision UIs to make genuine risks harder to ignore. 6:1-6:12
Privacy
- Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, Lorrie Faith Cranor:
What matters to users?: factors that affect users' willingness to share information with online advertisers. 7:1-7:12 - Lalit Agarwal, Nisheeth Shrivastava, Sharad Jaiswal, Saurabh Panjwani:
Do not embarrass: re-examining user concerns for online tracking and advertising. 8:1-8:13 - Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, George Loewenstein:
Sleights of privacy: framing, disclosures, and the limits of transparency. 9:1-9:11
Mobile devices
- Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel, Charles R. Crowell, John D'Arcy:
Modifying smartphone user locking behavior. 10:1-10:14 - Florian Schaub, Marcel Walch, Bastian Könings, Michael Weber:
Exploring the design space of graphical passwords on smartphones. 11:1-11:14 - Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, Carolyn Nguyen:
"Little brothers watching you": raising awareness of data leaks on smartphones. 12:1-12:11
Passwords
- Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith:
On the ecological validity of a password study. 13:1-13:13 - Julie Thorpe, Brent MacRae, Amirali Salehi-Abari:
Usability and security evaluation of GeoPass: a geographic location-password scheme. 14:1-14:14 - Elizabeth Stobert, Robert Biddle:
Memory retrieval and graphical passwords. 15:1-15:14
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.