SOUPS A

17 papers

YearTitle / Authors
2010A closer look at recognition-based graphical passwords on mobile devices.
Paul Dunphy, Andreas P. Heiner, N. Asokan
2010Do windows users follow the principle of least privilege?: investigating user account control practices.
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
2010Encountering stronger password requirements: user attitudes and behaviors.
Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor
2010Feasibility of structural network clustering for group-based privacy control in social networks.
Simon L. Jones, Eamonn O'Neill
2010Folk models of home computer security.
Rick Wash
2010Improving users' security choices on home wireless networks.
Justin T. Ho, David Dearman, Khai N. Truong
2010Influence of user perception, security needs, and social factors on device pairing method choices.
Iulia Ion, Marc Langheinrich, Ponnurangam Kumaraguru, Srdjan Capkun
2010On the impact of real-time feedback on users' behaviour in mobile location-sharing applications.
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Bandara, Bashar Nuseibeh
2010Optimizing a policy authoring framework for security and privacy policies.
Maritza Johnson, John Karat, Clare-Marie Karat, Keith Grueneberg
2010Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety.
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno
2010Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010
Lorrie Faith Cranor
2010Textured agreements: re-envisioning electronic consent.
Matthew Kay, Michael A. Terry
2010The impact of social navigation on privacy policy configuration.
Andrew Besmer, Jason Watson, Heather Richter Lipford
2010Towards understanding ATM security: a field study of real world ATM use.
Alexander De Luca, Marc Langheinrich, Heinrich Hussmann
2010Two heads are better than one: security and usability of device associations in group scenarios.
Ronald Kainda, Ivan Flechais, A. W. Roscoe
2010Usably secure, low-cost authentication for mobile banking.
Saurabh Panjwani, Edward Cutrell
2010Where do security policies come from?
Dinei A. F. Florêncio, Cormac Herley