| 2005 | Attacking information visualization system usability overloading and deceiving the human. Gregory J. Conti, Mustaque Ahamad, John T. Stasko |
| 2005 | Authentication using graphical passwords: effects of tolerance and image choice. Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon |
| 2005 | Developing privacy guidelines for social location disclosure applications and services. Giovanni Iachello, Ian E. Smith, Sunny Consolvo, Mike Y. Chen, Gregory D. Abowd |
| 2005 | Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. Simson L. Garfinkel, Robert C. Miller |
| 2005 | Making PRIME usable. John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann |
| 2005 | Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005 Lorrie Faith Cranor |
| 2005 | Social navigation as a model for usable security. Paul DiGioia, Paul Dourish |
| 2005 | Stopping spyware at the gate: a user study of privacy, notice and spyware. Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan |
| 2005 | The battle against phishing: Dynamic Security Skins. Rachna Dhamija, J. Doug Tygar |
| 2005 | Two experiences designing for effective security. Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David F. Redmiles, Jie Ren, Jennifer Ann Rode, Roberto Silveira Silva Filho |
| 2005 | Usable security and privacy: a case study of developing privacy management tools. Carolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng |