SOUPS A

15 papers

YearTitle / Authors
2006A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords.
Furkan Tari, A. Ant Ozok, Stephen H. Holden
2006Aligning usability and security: a usability study of Polaris.
Alexander J. DeWitt, Jasna Kuljis
2006An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench.
Carolyn Brodie, Clare-Marie Karat, John Karat
2006Decision strategies and susceptibility to phishing.
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor
2006Human selection of mnemonic phrase-based passwords.
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
2006Intentional access management: making access control usable for end-users.
Xiang Cao, Lee Iverson
2006Passpet: convenient password management and phishing protection.
Ka-Ping Yee, Kragen Sitaker
2006Password management strategies for online accounts.
Shirley Gaw, Edward W. Felten
2006Power strips, prophylactics, and privacy, oh my!
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti
2006Privacy and security threat analysis of the federal employee personal identity verification (PIV) program.
Paul A. Karger
2006Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006
Lorrie Faith Cranor
2006Protecting domestic power-line communications.
Richard E. Newman, Sherman Gavette, Larry Yonge, Ross J. Anderson
2006Seeing further: extending visualization as a basis for usable security.
Jennifer Ann Rode, Carolina Johansson, Paul DiGioia, Roberto Silveira Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, David F. Redmiles
2006The methodology and an application to fight against Unicode attacks.
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little
2006Web wallet: preventing phishing attacks by revealing user intentions.
Min Wu, Robert C. Miller, Greg Little