Abstract is missing.
- Aligning usability and security: a usability study of PolarisAlexander J. DeWitt, Jasna Kuljis. 1-7 [doi]
- An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbenchCarolyn Brodie, Clare-Marie Karat, John Karat. 8-19 [doi]
- Intentional access management: making access control usable for end-usersXiang Cao, Lee Iverson. 20-31 [doi]
- Passpet: convenient password management and phishing protectionKa-Ping Yee, Kragen Sitaker. 32-43 [doi]
- Password management strategies for online accountsShirley Gaw, Edward W. Felten. 44-55 [doi]
- A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwordsFurkan Tari, A. Ant Ozok, Stephen H. Holden. 56-66 [doi]
- Human selection of mnemonic phrase-based passwordsCynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor. 67-78 [doi]
- Decision strategies and susceptibility to phishingJulie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor. 79-90 [doi]
- The methodology and an application to fight against Unicode attacksAnthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little. 91-101 [doi]
- Web wallet: preventing phishing attacks by revealing user intentionsMin Wu, Robert C. Miller, Greg Little. 102-113 [doi]
- Privacy and security threat analysis of the federal employee personal identity verification (PIV) programPaul A. Karger. 114-121 [doi]
- Protecting domestic power-line communicationsRichard E. Newman, Sherman Gavette, Larry Yonge, Ross Anderson. 122-132 [doi]
- Power strips, prophylactics, and privacy, oh my!Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti. 133-144 [doi]
- Seeing further: extending visualization as a basis for usable securityJennifer Ann Rode, Carolina Johansson, Paul DiGioia, Roberto Silveira Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, David F. Redmiles. 145-155 [doi]