Proceedings of the 2008 Symposium on Usable Privacy and Security

Publisher
ACM Press
Website
Year
2008
Period
Place
ISBN
Series
SOUPS - Symposium on Usable Privacy and Security
DOI
Volume
Copyright info

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

All years

Articles

Forget, Alain, Chiasson, Sonia, Oorschot, P. C. van, Biddle, Robert (2008): Improving text passwords through persuasion. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 1-12. https://doi.acm.org/10.1145/1408664.1408666

Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118. https://doi.acm.org/10.1145/1408664.1408679

Falk, Laura, Prakash, Atul, Borders, Kevin (2008): Analyzing websites for user-visible security design flaws. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 117-126. https://doi.acm.org/10.1145/1408664.1408680

Rabkin, Ariel (2008): Personal knowledge questions for fallback authentication: security questions in the era of. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 13-23. https://doi.acm.org/10.1145/1408664.1408667

Dunphy, Paul, Nicholson, James, Olivier, Patrick (2008): Securing passfaces for description. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 24-35. https://doi.acm.org/10.1145/1408664.1408668

Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670

Yan, Jeff, Ahmad, Ahmad Salah El (2008): Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 44-52. https://doi.acm.org/10.1145/1408664.1408671

Saxena, Nitesh, Uddin, Md. Borhan, Voris, Jonathan (2008): Universal device pairing using an auxiliary device. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 56-67. https://doi.acm.org/10.1145/1408664.1408672

Vaniea, Kami, Karat, Clare-Marie, Gross, Joshua B., Karat, John, Brodie, Carolyn (2008): Evaluating assistance of natural language policy authoring. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 65-73. https://doi.acm.org/10.1145/1408664.1408674

Inglesant, Philip, Sasse, M. Angela, Chadwick, David, Shi, Lei Lei (2008): Expressions of expertness: the virtuous circle of natural language for access control poli. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 77-88. https://doi.acm.org/10.1145/1408664.1408675

Brustoloni, José C., Villamarín-Salomón, Ricardo, Djalaliev, Peter, Kyle, David (2008): Evaluating the usability of usage controls in electronic collaboration. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 85-92. https://doi.acm.org/10.1145/1408664.1408676

Stedman, Ryan, Yoshida, Kayo, Goldberg, Ian (2008): A user study of off-the-record messaging. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 95-104. https://doi.acm.org/10.1145/1408664.1408678