-
1
-
-
0034777649
-
Intercepting Mobile Communications: The Insecurity of 802.11
-
Borisov, N., Goldberg, I., & Wagner, D., "Intercepting Mobile Communications: The Insecurity of 802.11," Proc. of MOBICOM '01, Rome, Italy, (2001), pp.180-9.
-
Proc. of MOBICOM '01, Rome, Italy, (2001)
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
2
-
-
57649166927
-
You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings
-
Egelman, S., Cranor, L.F., & Hong, J., "You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings," Proc. of CHI '08, Florence, Italy, (2008), pp. 1065-74.
-
Proc. of CHI '08, Florence, Italy, (2008)
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
3
-
-
0038418748
-
Informed Consent in the Mozilla Browser
-
Hawaii, USA
-
Friedman, B., Howe, D.C., & Felten, E., "Informed Consent in the Mozilla Browser," Proc. of HICSS '02, Vol, 8, Hawaii, USA, (2002), pp. 247-56.
-
(2002)
Proc. of HICSS '02
, vol.8
, pp. 247-256
-
-
Friedman, B.1
Howe, D.C.2
Felten, E.3
-
4
-
-
70349276980
-
Privacy Oracle: A System for Finding Application Leaks Using Black-Box Differential Testing
-
Jung, J., Sheth, A., Greenstein, B., Wetherall D., Maganis, G., & Kohno, T., "Privacy Oracle: A System for Finding Application Leaks Using Black-Box Differential Testing," Proc. of CCS '08, Alexandria, VA, USA, (2008), pp. 279-88.
-
Proc. of CCS '08, Alexandria, VA, USA, (2008)
, pp. 279-288
-
-
Jung, J.1
Sheth, A.2
Greenstein, B.3
Wetherall, D.4
Maganis, G.5
Kohno, T.6
-
5
-
-
70450181109
-
Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access
-
Kindberg, T., Bevan, C., O'Neill, E., Mitchell, J., Grimmett, J., & Woodgate, D., "Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access," Proc. of UbiComp '09, Orlando, FL, USA, (2009), pp. 115-24.
-
Proc. of UbiComp '09, Orlando, FL, USA, (2009)
, pp. 115-124
-
-
Kindberg, T.1
Bevan, C.2
O'Neill, E.3
Mitchell, J.4
Grimmett, J.5
Woodgate, D.6
-
6
-
-
57649195230
-
Measuring Trust in Wi-Fi Hotspots
-
Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Stanton Fraser, D., & Jay, T., "Measuring Trust in Wi-Fi Hotspots," Proc. of CHI '08, Florence, Italy, (2008), pp. 173-82.
-
Proc. of CHI '08, Florence, Italy, (2008)
, pp. 173-182
-
-
Kindberg, T.1
O'Neill, E.2
Bevan, C.3
Kostakos, V.4
Stanton Fraser, D.5
Jay, T.6
-
7
-
-
79958101213
-
'When I am on Wi-Fi, I am Fearless:' Privacy Concerns & Practices in Everyday Wi-Fi Use
-
Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., & Wetherall, D., "'When I am on Wi-Fi, I am Fearless:' Privacy Concerns & Practices in Everyday Wi-Fi Use," Proc. of CHI '09, Boston, MA, USA, (Apr 2009), pp. 1993-2002.
-
Proc. of CHI '09, Boston, MA, USA, (Apr 2009)
, pp. 1993-2002
-
-
Klasnja, P.1
Consolvo, S.2
Jung, J.3
Greenstein, B.4
LeGrand, L.5
Powledge, P.6
Wetherall, D.7
-
8
-
-
33748990899
-
Peripheral Privacy Notifications for Wireless Networks
-
Kowitz, B. & Cranor, L., "Peripheral Privacy Notifications for Wireless Networks," Proc. of the WPES '05, Alexandria, VA, USA, (2005), pp.90-6.
-
Proc. of the WPES '05, Alexandria, VA, USA, (2005)
, pp. 90-96
-
-
Kowitz, B.1
Cranor, L.2
-
9
-
-
70350714542
-
School of Phish: A Real-World Evaluation of Anti-Phishing Training
-
Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L., Hong, J., Blair, M.A., & Pham, T., "School of Phish: A Real-World Evaluation of Anti-Phishing Training," Proc. of SOUPS '09, Mountain View, CA, USA, (2009).
-
Proc. of SOUPS '09, Mountain View, CA, USA, (2009)
-
-
Kumaraguru, P.1
Cranshaw, J.2
Acquisti, A.3
Cranor, L.4
Hong, J.5
Blair, M.A.6
Pham, T.7
-
10
-
-
0033726422
-
Tradeoffs in Displaying Peripheral Information
-
Maglio, P.P. & Campbell, C.S., "Tradeoffs in Displaying Peripheral Information," Proc. of CHI '00, The Hague, The Netherlands, (2000), pp. 241-8.
-
Proc. of CHI '00, the Hague, the Netherlands, (2000)
, pp. 241-248
-
-
Maglio, P.P.1
Campbell, C.S.2
-
11
-
-
0038037379
-
Unpacking "Privacy" for a Networked World
-
Palen, L. & Dourish, P., "Unpacking "Privacy" for a Networked World," Proc. of CHI '03, Ft. Lauderdale, FL, USA, (2003), pp. 129-36.
-
Proc. of CHI '03, Ft. Lauderdale, FL, USA, (2003)
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
12
-
-
78650008021
-
How Secure is Your Wi-Fi Connection?
-
Jan 4, verified 7 March 2010}
-
Pogue, D., "How Secure is Your Wi-Fi Connection?" New York Times, (Jan 4, 2007). http://pogue.blogs.nytimes.com/2007/01/04/04pogueemail/, {verified 7 March 2010}.
-
(2007)
New York Times
-
-
Pogue, D.1
-
13
-
-
60649113812
-
Anti-Phishing Phil: The Design and Evaluation of a Game that Teaches People Not to Fall for Phish
-
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E., "Anti-Phishing Phil: The Design and Evaluation of a Game that Teaches People Not to Fall for Phish," Proc. of SOUPS '07, Pittsburgh, PA, USA, (2007).
-
Proc. of SOUPS '07, Pittsburgh, PA, USA, (2007)
-
-
Sheng, S.1
Magnien, B.2
Kumaraguru, P.3
Acquisti, A.4
Cranor, L.F.5
Hong, J.6
Nunge, E.7
-
14
-
-
57649180971
-
Sesame: Informing User Security Decisions with System Visualization
-
Stoll, J., Tashman, C.S., Edwards, W.K., Spafford, K., "Sesame: Informing User Security Decisions with System Visualization," Proc. of CHI '08, Florence, Italy, (2008), pp. 1045-54.
-
Proc. of CHI '08, Florence, Italy, (2008)
, pp. 1045-1054
-
-
Stoll, J.1
Tashman, C.S.2
Edwards, W.K.3
Spafford, K.4
-
15
-
-
0037941821
-
-
SAGE, Thousand Oaks
-
Strauss, A., & Corbin, J., Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, SAGE, Thousand Oaks, (1998).
-
(1998)
Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory
-
-
Strauss, A.1
Corbin, J.2
|