4 | -- | 0 | M. Brian Blake. Twenty Years in the Making |
6 | -- | 7 | Charles Petrie. Internet Computing Begins |
8 | -- | 10 | William Regli. Past as Prolog(ue): Humans, Machines, and 20 Years of Internet Computing |
12 | -- | 18 | Brent Smith, Greg Linden. Two Decades of Recommender Systems at Amazon.com |
19 | -- | 21 | Rick Wash, Mary Ellen Zurko. Usable Security |
22 | -- | 29 | Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala. TLS Inspection: How Often and Who Cares? |
30 | -- | 38 | Wei Bai 0004, Doowon Kim, Moses Namara, Yichen Qian, Patrick Gage Kelley, Michelle L. Mazurek. Balancing Security and Usability in Encrypted Email |
40 | -- | 46 | Sathya Chandran Sundaramurthy, Michael Wesch, Xinming Ou, John McHugh, S. Raj Rajagopalan, Alexandru G. Bardas. Humans Are Dynamic - Our Tools Should Be Too |
48 | -- | 55 | Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate. Longitudinal Privacy Management in Social Media: The Need for Better Controls |
56 | -- | 63 | Tousif Ahmed, Roberto Hoyle, Patrick Shaffer, Kay Connelly, David J. Crandall, Apu Kapadia. Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments |
64 | -- | 69 | Katharina Krombholz, Thomas Hupperich, Thorsten Holz. May the Force Be with You: The Future of Force-Sensitive Authentication |
70 | -- | 77 | Florian Schaub, Rebecca Balebako, Lorrie Faith Cranor. Designing Effective Privacy Notices and Controls |
78 | -- | 81 | Dah-Ming Chiu. Internet Evolution |
82 | -- | 87 | Moo-Ryong Ra, Seungjoon Lee, Emiliano Miluzzo, Eric Zavesky. Do Not Capture: Automated Obscurity for Pervasive Imaging |
88 | -- | 92 | Prateek Sharma, David E. Irwin, Prashant J. Shenoy. Keep It Simple: Bidding for Servers in Today's Cloud Platforms |
94 | -- | 98 | Jimmy Lin. In Defense of MapReduce |
99 | -- | 102 | Hilarie Orman. You Let That In? |
103 | -- | 104 | Vinton G. Cerf. On the Simulation of Everything |