Proceedings of the 2005 Symposium on Usable Privacy and Security
- Publisher
- ACM Press
- Website
- Year
- 2005
- Period
- Place
- ISBN
- Series
- SOUPS - Symposium on Usable Privacy and Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Wiedenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex, Memon, Nasir (2005): Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 1-12. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p1-wiedenbeck.pdf
DiGioia, Paul, Dourish, Paul (2005): Social navigation as a model for usable security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 101-108. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p101-digioia.pdf
Garfinkel, Simson L., Miller, Robert C. (2005): Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 13-24. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p13-garfinkel.pdf
Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann, Filho, Roberto Silva (2005): Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 25-34. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf
Brodie, Carolyn, Karat, Clare-Marie, Karat, John, Feng, Jinjuan (2005): Usable security and privacy: a case study of developing privacy management tools. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 35-43. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p35-brodie.pdf
Good, Nathaniel, Dhamija, Rachna, Grossklags, Jens, Thaw, David, Aronowitz, Steven, Mulligan, Deirdre, Konstan, Joseph A. (2005): Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 43-52. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p43-good.pdf
Pettersson, John Soren, Fischer-Hübner, Simone, Danielsson, Ninni, Nilsson, Jenny, Bergmann, Mike, Clauss, Sebastian, Kriegelstein, Thomas, Krasemann, Henry (2005): Making PRIME usable. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 53-64. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p53-pettersson.pdf
Iachello, Giovanni, Smith, Ian, Consolvo, Sunny, Chen, Mike, Abowd, Gregory D. (2005): Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 65-76. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p65-iachello.pdf
Dhamija, Rachna, Tygar, J. D. (2005): The battle against phishing: Dynamic Security Skins. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 77-88. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p77-dhamija.pdf
Conti, Gregory, Ahamad, Mustaque, Stasko, John T. (2005): Attacking information visualization system usability overloading and deceiving the human. In: Proceedings of the 2005 Symposium on Usable Privacy and Security , 2005, . pp. 89-100. https://cups.cs.cmu.edu/soups/2005/2005proceedings/p89-conti.pdf