Abstract is missing.
- Understanding Privacy Settings in Facebook with an Audience ViewHeather Richter Lipford, Andrew Besmer, Jason Watson. [doi]
- Centered Discretization with Application to Graphical PasswordsSonia Chiasson, Jayakumar Srinivasan, Robert Biddle, Paul C. van Oorschot. [doi]
- IRBs and Security Research: Myths, Facts and Mission CreepSimson L. Garfinkel. [doi]
- Freezing More Than Bits: Chilling Effects of the OLPC XO Security ModelMeredith L. Patterson, Len Sassaman, David Chaum. [doi]
- RUST: A Retargetable Usability Testbed for Web Site Authentication TechnologiesMaritza L. Johnson, Chaitanya Atreya, Adam J. Aviv, Steven M. Bellovin, Gail E. Kaiser. [doi]
- Predicted and Observed User Behavior in the Weakest-link Security GameJens Grossklags, Nicolas Christin, John Chuang. [doi]
- Where s The Beep? Security, Privacy, and User Misunderstandings of RFIDJennifer King, Andrew McDiarmid. [doi]
- Using Salience Differentials to Making Visual Cues NoticeableAndreas P. Heiner, N. Asokan. [doi]
- iPhish: Phishing Vulnerabilities on Consumer ElectronicsYuan Niu, Francis Hsu, Hao Chen. [doi]
- A Framework for Reasoning About the Human in the LoopLorrie Faith Cranor. [doi]
- Ad-hoc Guesting: When Exceptions Are the RuleBrinda Dalal, Les Nelson, Diana K. Smetters, Nathaniel Good, Ame Elliot. [doi]
- A User Study Design for Comparing the Security of Registration ProtocolsChris Karlof, J. Doug Tygar, David Wagner. [doi]
- Biometric Daemons: Authentication via Electronic PetsPamela Briggs, Patrick L. Olivier. [doi]