| 2006 | A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. Furkan Tari, A. Ant Ozok, Stephen H. Holden |
| 2006 | Aligning usability and security: a usability study of Polaris. Alexander J. DeWitt, Jasna Kuljis |
| 2006 | An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. Carolyn Brodie, Clare-Marie Karat, John Karat |
| 2006 | Decision strategies and susceptibility to phishing. Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor |
| 2006 | Human selection of mnemonic phrase-based passwords. Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor |
| 2006 | Intentional access management: making access control usable for end-users. Xiang Cao, Lee Iverson |
| 2006 | Passpet: convenient password management and phishing protection. Ka-Ping Yee, Kragen Sitaker |
| 2006 | Password management strategies for online accounts. Shirley Gaw, Edward W. Felten |
| 2006 | Power strips, prophylactics, and privacy, oh my! Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti |
| 2006 | Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. Paul A. Karger |
| 2006 | Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 Lorrie Faith Cranor |
| 2006 | Protecting domestic power-line communications. Richard E. Newman, Sherman Gavette, Larry Yonge, Ross J. Anderson |
| 2006 | Seeing further: extending visualization as a basis for usable security. Jennifer Ann Rode, Carolina Johansson, Paul DiGioia, Roberto Silveira Silva Filho, Kari Nies, David H. Nguyen, Jie Ren, Paul Dourish, David F. Redmiles |
| 2006 | The methodology and an application to fight against Unicode attacks. Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little |
| 2006 | Web wallet: preventing phishing attacks by revealing user intentions. Min Wu, Robert C. Miller, Greg Little |