Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2018
- Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, Elissa M. Redmiles:
Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality. SOUPS @ USENIX Security Symposium 2018: 427-442 - Hala Assal, Sonia Chiasson:
Security in the Software Development Lifecycle. SOUPS @ USENIX Security Symposium 2018: 281-296 - Orçun Çetin, Carlos Gañán, Lisette Altena, Samaneh Tajalizadehkhoob, Michel van Eeten:
Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens. SOUPS @ USENIX Security Symposium 2018: 251-263 - Peter Leo Gorski, Luigi Lo Iacono, Dominik Wermke, Christian Stransky, Sebastian Möller, Yasemin Acar, Sascha Fahl:
Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. SOUPS @ USENIX Security Symposium 2018: 265-281 - Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor:
Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing. SOUPS @ USENIX Security Symposium 2018: 159-175 - Hana Habib, Pardis Emami Naeini, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor:
User Behaviors and Attitudes Under Password Expiration Policies. SOUPS @ USENIX Security Symposium 2018: 13-30 - Julie M. Haney, Wayne G. Lutters:
"It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security. SOUPS @ USENIX Security Symposium 2018: 411-425 - Julie M. Haney, Mary Theofanos, Yasemin Acar, Sandra Spickard Prettyman:
"We make it a big deal in the company": Security Mindsets in Organizations that Develop Cryptographic Products. SOUPS @ USENIX Security Symposium 2018: 357-373 - Norman Hänsch, Andrea Schankin, Mykolai Protsenko, Felix C. Freiling, Zinaida Benenson:
Programming Experience Might Not Help in Comprehending Obfuscated Source Code Efficiently. SOUPS @ USENIX Security Symposium 2018: 341-356 - Sowmya Karunakaran, Kurt Thomas, Elie Bursztein, Oxana Comanescu:
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data. SOUPS @ USENIX Security Symposium 2018: 217-234 - Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty:
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. SOUPS @ USENIX Security Symposium 2018: 103-116 - Reham Ebada Mohamed, Sonia Chiasson:
Online Privacy and Aging of Digital Artifacts. SOUPS @ USENIX Security Symposium 2018: 177-195 - Ambar Murillo, Andreas Kramm, Sebastian Schnorf, Alexander De Luca:
"If I press delete, it's gone" - User Understanding of Online Data Deletion and Expiration. SOUPS @ USENIX Security Symposium 2018: 329-339 - Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Matthew Smith:
Deception Task Design in Developer Password Studies: Exploring a Student Sample. SOUPS @ USENIX Security Symposium 2018: 297-313 - James Nicholson, Lynne M. Coventry, Pam Briggs:
Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. SOUPS @ USENIX Security Symposium 2018: 443-457 - Norbert Nthala, Ivan Flechais:
Informal Support Networks: an investigation into Home Data Security Practices. SOUPS @ USENIX Security Symposium 2018: 63-82 - Daniela Seabra Oliveira, Tian Lin, Muhammad Sajidur Rahman, Rad Akefirad, Donovan M. Ellis, Eliany Perez, Rahul Bobhate, Lois DeLong, Justin Cappos, Yuriy Brun:
API Blindspots: Why Experienced Developers Write Vulnerable Code. SOUPS @ USENIX Security Symposium 2018: 315-328 - Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, Jason I. Hong:
Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. SOUPS @ USENIX Security Symposium 2018: 83-102 - Elham Al Qahtani, Mohamed Shehab, Abrar Aljohani:
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. SOUPS @ USENIX Security Symposium 2018: 31-46 - Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, Norman Makoto Su:
"You don't want to be the next meme": College Students' Workarounds to Manage Privacy in the Era of Pervasive Photography. SOUPS @ USENIX Security Symposium 2018: 143-157 - Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
A Comparative Usability Study of Key Management in Secure Email. SOUPS @ USENIX Security Symposium 2018: 375-394 - Sonam Samat, Eyal Péer, Alessandro Acquisti:
Can Digital Face-Morphs Influence Attitudes and Online Behaviors? SOUPS @ USENIX Security Symposium 2018: 117-125 - Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, Elizabeth F. Churchill:
"Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. SOUPS @ USENIX Security Symposium 2018: 127-142 - Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent E. Seamons, Daniel Zappala:
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal. SOUPS @ USENIX Security Symposium 2018: 47-62 - Melanie Volkamer, Andreas Gutmann, Karen Renaud, Paul Gerber, Peter Mayer:
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios. SOUPS @ USENIX Security Symposium 2018: 1-11 - Daniel Votipka, Seth M. Rabin, Kristopher K. Micinski, Thomas Gilray, Michelle L. Mazurek, Jeffrey S. Foster:
User Comfort with Android Background Resource Accesses in Different Contexts. SOUPS @ USENIX Security Symposium 2018: 235-250 - Justin Wu, Daniel Zappala:
When is a Tree Really a Truck? Exploring Mental Models of Encryption. SOUPS @ USENIX Security Symposium 2018: 395-409 - Yixin Zou, Abraham H. Mhaidli, Austin McCall, Florian Schaub:
"I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. SOUPS @ USENIX Security Symposium 2018: 197-216 - Mary Ellen Zurko, Heather Richter Lipford:
Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018. USENIX Association 2018 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-21 20:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint