Proceedings of the 2008 Symposium on Usable Privacy and Security
- Publisher
- ACM Press
- Website
- Year
- 2008
- Period
- Place
- ISBN
- Series
- SOUPS - Symposium on Usable Privacy and Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Forget, Alain, Chiasson, Sonia, Oorschot, P. C. van, Biddle, Robert (2008): Improving text passwords through persuasion. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 1-12. https://doi.acm.org/10.1145/1408664.1408666
Werlinger, Rodrigo, Hawkey, Kirstie, Muldner, Kasia, Jaferian, Pooya, Beznosov, Konstantin (2008): The challenges of using an intrusion detection system: is it worth the effort?. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 107-118. https://doi.acm.org/10.1145/1408664.1408679
Falk, Laura, Prakash, Atul, Borders, Kevin (2008): Analyzing websites for user-visible security design flaws. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 117-126. https://doi.acm.org/10.1145/1408664.1408680
Rabkin, Ariel (2008): Personal knowledge questions for fallback authentication: security questions in the era of. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 13-23. https://doi.acm.org/10.1145/1408664.1408667
Dunphy, Paul, Nicholson, James, Olivier, Patrick (2008): Securing passfaces for description. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 24-35. https://doi.acm.org/10.1145/1408664.1408668
Hayashi, Eiji, Dhamija, Rachna, Christin, Nicolas, Perrig, Adrian (2008): Use Your Illusion: secure authentication usable anywhere. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 35-45. https://doi.acm.org/10.1145/1408664.1408670
Yan, Jeff, Ahmad, Ahmad Salah El (2008): Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 44-52. https://doi.acm.org/10.1145/1408664.1408671
Saxena, Nitesh, Uddin, Md. Borhan, Voris, Jonathan (2008): Universal device pairing using an auxiliary device. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 56-67. https://doi.acm.org/10.1145/1408664.1408672
Vaniea, Kami, Karat, Clare-Marie, Gross, Joshua B., Karat, John, Brodie, Carolyn (2008): Evaluating assistance of natural language policy authoring. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 65-73. https://doi.acm.org/10.1145/1408664.1408674
Inglesant, Philip, Sasse, M. Angela, Chadwick, David, Shi, Lei Lei (2008): Expressions of expertness: the virtuous circle of natural language for access control poli. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 77-88. https://doi.acm.org/10.1145/1408664.1408675
Brustoloni, José C., Villamarín-Salomón, Ricardo, Djalaliev, Peter, Kyle, David (2008): Evaluating the usability of usage controls in electronic collaboration. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 85-92. https://doi.acm.org/10.1145/1408664.1408676
Stedman, Ryan, Yoshida, Kayo, Goldberg, Ian (2008): A user study of off-the-record messaging. In: Proceedings of the 2008 Symposium on Usable Privacy and Security , 2008, . pp. 95-104. https://doi.acm.org/10.1145/1408664.1408678