Abstract is missing.
- Authentication using graphical passwords: effects of tolerance and image choiceSusan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon. 1-12 [doi]
- Johnny 2: a user test of key continuity management with S/MIME and Outlook ExpressSimson L. Garfinkel, Robert C. Miller. 13-24 [doi]
- Two experiences designing for effective securityRogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David F. Redmiles, Jie Ren, Jennifer Ann Rode, Roberto Silveira Silva Filho. 25-34 [doi]
- Usable security and privacy: a case study of developing privacy management toolsCarolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng. 35-43 [doi]
- Stopping spyware at the gate: a user study of privacy, notice and spywareNathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan. 43-52 [doi]
- Making PRIME usableJohn Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann. 53-64 [doi]
- Developing privacy guidelines for social location disclosure applications and servicesGiovanni Iachello, Ian E. Smith, Sunny Consolvo, Mike Y. Chen, Gregory D. Abowd. 65-76 [doi]
- The battle against phishing: Dynamic Security SkinsRachna Dhamija, J. Doug Tygar. 77-88 [doi]
- Attacking information visualization system usability overloading and deceiving the humanGregory J. Conti, Mustaque Ahamad, John T. Stasko. 89-100 [doi]
- Social navigation as a model for usable securityPaul DiGioia, Paul Dourish. 101-108 [doi]