Abstract is missing.
- A user study of the expandable grid applied to P3P privacy policy visualizationRobert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor. [doi]
- New directions in multisensory authenticationMadoka Hasegawa, Nicolas Christin, Eiji Hayashi. [doi]
- Serial hook-ups: a comparative usability study of secure device pairing methodsAlfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun, Yang Wang 0005. [doi]
- Short and long term research suggestions for NSF and NISTNancy Gillis. [doi]
- Balancing usability and security in a video CAPTCHAKurt Alfred Kluever, Richard Zanibbi. [doi]
- Invisible HCI-SEC: ways of re-architecting the operating system to increase usability and securitySimson L. Garfinkel. [doi]
- Social applications: exploring a more secure frameworkAndrew Besmer, Heather Richter Lipford, Mohamed Shehab, Gorrell Cheek. [doi]
- Graphical passwords as browser extension: implementation and usability studyKemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay. [doi]
- 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authenticationStuart E. Schechter, Robert W. Reeder. [doi]
- Look into my eyes!: can you guess my password?Alexander De Luca, Martin Denzel, Heinrich Hussmann. [doi]
- Revealing hidden context: improving mental models of personal firewall usersFahimeh Raja, Kirstie Hawkey, Konstantin Beznosov. [doi]
- Machine learning attacks against the Asirra CAPTCHAPhilippe Golle. [doi]
- Integrating usability and accessibility in information assurance educationAzene Zenebe, Claude Tuner, Jinjuan Feng, Jonathan Lazar, Mike O Leary. [doi]
- Privacy suites: shared privacy for social networksJoseph Bonneau, Jonathan Anderson, Luke Church. [doi]
- Who s viewed you?: the impact of feedback in a mobile location-sharing applicationJanice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh. [doi]
- flyByNight: mitigating the privacy risks of social networkingMatthew M. Lucas, Nikita Borisov. [doi]
- Threshold things that think: usable authorization for resharingRoel Peeters, Markulf Kohlweiss, Bart Preneel, Nicky Sulmon. [doi]
- Challenges in supporting end-user privacy and security management with social navigationJeremy Goecks, W. Keith Edwards, Elizabeth D. Mynatt. [doi]
- Treat em like other devices: user authentication of multiple personal RFID tagsNitesh Saxena, Md. Borhan Uddin, Jonathan Voris. [doi]
- It s not what you know, but who you know: a social approach to last-resort authenticationStuart E. Schechter, Serge Egelman, Robert W. Reeder. [doi]
- A comparative study of online privacy policies and formatsAleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor. [doi]
- The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharingMichael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma. [doi]
- Designing and evaluating usable security and privacy technologyMartina Angela Sasse, Clare-Marie Karat, Roy A. Maxion. [doi]
- A new graphical password scheme against spyware by using CAPTCHAHaichang Gao, Xiyang Liu. [doi]
- How users use access controlDiana K. Smetters, Nathan Good. [doi]
- Studying location privacy in mobile applications: predator vs. prey probesKeerthi Thomas, Clara Mancini, Lukasz Jedrzejczyk, Arosha K. Bandara, Adam N. Joinson, Blaine A. Price, Yvonne Rogers, Bashar Nuseibeh. [doi]
- Usability and security of out-of-band channels in secure device pairing protocolsRonald Kainda, Ivan Flechais, A. W. Roscoe. [doi]
- It s no secret: measuring the security and reliability of authentication via secret questionsStuart E. Schechter, A. J. Bernheim Brush, Serge Egelman. [doi]
- The impact of privacy indicators on search engine browsing patternsJanice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti. [doi]
- Conditioned-safe ceremonies and a user study of an application to web authenticationChris Karlof, J. D. Tygar, David Wagner. [doi]
- How does the emergence of reputation mechanisms affect the overall trust formation mechanisms, implicit and explicit, in the online environment?Kristiina Karvonen. [doi]
- Privacy stories: confidence in privacy behaviors through end user programmingLuke Church, Jonathan Anderson, Joseph Bonneau, Frank Stajano. [doi]
- Personal choice and challenge questions: a security and usability assessmentMike Just, David Aspinall. [doi]
- Ubiquitous systems and the family: thoughts about the networked homeLinda Little, Elizabeth Sillence, Pamela Briggs. [doi]
- Designing for different levels of social inference riskSara Motahari, Sotirios G. Ziavras, Quentin Jones. [doi]
- Recall-a-story, a story-telling graphical password systemYves Maetz, Stéphane Onno, Olivier Heen. [doi]
- Usable deidentification of sensitive patient care dataMichael McQuaid, Kai Zheng, Nigel Melville, Lee Green. [doi]
- A nutrition label for privacyPatrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder. [doi]
- BayeShield: conversational anti-phishing user interfacePeter Likarish, Don Dunbar, Juan Pablo Hourcade, Eunjin Jung. [doi]
- Not one click for security?Alan H. Karp, Marc Stiegler, Tyler Close. [doi]
- The family and communication technologiesLinda Little. [doi]
- School of phish: a real-word evaluation of anti-phishing trainingPonnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham. [doi]
- Ecological validity in studies of security and human behaviourAndrew Patrick. [doi]
- Technology transfer of successful usable security research into productMary Ellen Zurko. [doi]
- Think Evil (tm)Nicholas Weaver. [doi]
- Educated guess on graphical authentication schemes: vulnerabilities and countermeasuresEiji Hayashi, Jason Hong, Nicolas Christin. [doi]
- Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden?Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh. [doi]
- Analyzing use of privacy policy attributes in a location sharing applicationEran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai. [doi]
- A multi-method approach for user-centered design of identity management systemsPooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov. [doi]
- Textured agreements: re-envisioning electronic consentMatthew Kay, Michael Terry. [doi]
- Escape from the matrix: lessons from a case-study in access-control requirementsKathi Fisler, Shriram Krishnamurthi. [doi]
- Sanitization s slippery slope: the design and study of a text revision assistantRichard Chow, Ian Oberst, Jessica Staddon. [doi]
- Games for extracting randomnessRan Halprin, Moni Naor. [doi]