Proceedings of the 2010 Symposium on Usable Privacy and Security
- Website
- Year
- 2010
- Period
- Place
- ISBN
- Series
- SOUPS - Symposium on Usable Privacy and Security
- DOI
- Volume
- Copyright info
Description
All years
Articles
Motiee, Sara, Hawkey, Kirstie, Beznosov, Konstantin (2010): Do windows users follow the principle of least privilege?: investigating user account cont. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 1. https://doi.acm.org/10.1145/1837110.1837112
Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. https://doi.acm.org/10.1145/1837110.1837113
Dunphy, Paul, Heiner, Andreas P., Asokan, N. (2010): A closer look at recognition-based graphical passwords on mobile devices. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 3. https://doi.acm.org/10.1145/1837110.1837114
Panjwani, Saurabh, Cutrell, Edward (2010): Usably secure, low-cost authentication for mobile banking. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 4. https://doi.acm.org/10.1145/1837110.1837116
Kainda, Ronald, Flechais, Ivan, Roscoe, A. W. (2010): Two heads are better than one: security and usability of device associations in group scen. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 5. https://doi.acm.org/10.1145/1837110.1837117
Ion, Iulia, Langheinrich, Marc, Kumaraguru, Ponnurangam, Capkun, Srdjan (2010): Influence of user perception, security needs, and social factors on device pairing method . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 6. https://doi.acm.org/10.1145/1837110.1837118
Besmer, Andrew, Watson, Jason, Lipford, Heather Richter (2010): The impact of social navigation on privacy policy configuration. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 7. https://doi.acm.org/10.1145/1837110.1837120
Johnson, Maritza, Karat, John, Karat, Clare-Marie, Grueneberg, Keith (2010): Optimizing a policy authoring framework for security and privacy policies. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 8. https://doi.acm.org/10.1145/1837110.1837121
Jones, Simon, O'Neill, Eamonn (2010): Feasibility of structural network clustering for group-based privacy control in social net. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 9. https://doi.acm.org/10.1145/1837110.1837122
Florencio, Dinei, Herley, Cormac (2010): Where do security policies come from?. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 10. https://doi.acm.org/10.1145/1837110.1837124
Wash, Rick (2010): Folk models of home computer security. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 11. https://doi.acm.org/10.1145/1837110.1837125
Ho, Justin T., Dearman, David, Truong, Khai N. (2010): Improving users' security choices on home wireless networks. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 12. https://doi.acm.org/10.1145/1837110.1837126
Kay, Matthew, Terry, Michael (2010): Textured agreements: re-envisioning electronic consent. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 13. https://doi.acm.org/10.1145/1837110.1837127
Jedrzejczyk, Lukasz, Price, Blaine A., Bandara, Arosha K., Nuseibeh, Bashar (2010): On the impact of real-time feedback on users' behaviour in mobile location-sharing applica. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 14. https://doi.acm.org/10.1145/1837110.1837129
Czeskis, Alexei, Dermendjieva, Ivayla, Yapit, Hussein, Borning, Alan, Friedman, Batya, Gill, Brian, Kohno, Tadayoshi (2010): Parenting from the pocket: value tensions and technical directions for secure and private . In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 15. https://doi.acm.org/10.1145/1837110.1837130
Luca, Alexander De, Langheinrich, Marc, Hussmann, Heinrich (2010): Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 16. https://doi.acm.org/10.1145/1837110.1837131