-
1
-
-
84995514651
-
Privacy-enabling social networking over untrusted networks
-
J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-enabling Social Networking over Untrusted Networks. In Proceedings of the 2nd ACM Workshop on Online Social Networks, pages 1-6, 2009.
-
(2009)
Proceedings of the 2nd ACM Workshop on Online Social Networks
, pp. 1-6
-
-
Anderson, J.1
Diaz, C.2
Bonneau, J.3
Stajano, F.4
-
3
-
-
0002020833
-
"SUS: A quick and dirty" usability scale
-
P. Jordan, B. Thomas, B. Weerdmeester, and A. McClelland, editors, Taylor and Francis
-
J. Brooke. SUS: A "Quick and Dirty" Usability Scale. In P. Jordan, B. Thomas, B. Weerdmeester, and A. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, 1996.
-
(1996)
Usability Evaluation in Industry
-
-
Brooke, J.1
-
4
-
-
84860852833
-
Musubi: Disintermediated interactive social feeds for mobile devices
-
B. Dodson, I. Vo, T. J. Purtell, A. Cannon, and M. S. Lam. Musubi: Disintermediated Interactive Social Feeds for Mobile Devices. In Proceedings of the 21st International Conference on World Wide Web, pages 211 - 220, 2012.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web
, pp. 211-220
-
-
Dodson, B.1
Vo, I.2
Purtell, T.J.3
Cannon, A.4
Lam, M.S.5
-
6
-
-
84892467344
-
Timing is everything?: The effects of timing and placement of online privacy indicators
-
ACM
-
S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the 27th International Conference on Human Factors in Computing Systems, pages 319-328. ACM, 2009.
-
(2009)
Proceedings of the 27th International Conference on Human Factors in Computing Systems
, pp. 319-328
-
-
Egelman, S.1
Tsai, J.2
Cranor, L.F.3
Acquisti, A.4
-
7
-
-
84868107467
-
Confidentiality as a service - Usable security for the cloud
-
S. Fahl, M. Harbach, T. Muders, and M. Smith. Confidentiality as a Service - Usable Security for the Cloud. In Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2012.
-
(2012)
Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
-
9
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
Nov
-
S. Garfinkel. Email-based Identification and Authentication: An Alternative to PKI? IEEE Security & Privacy, 1(6):20-26, Nov. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.1
-
12
-
-
84859800820
-
A research agenda acknowledging the persistence of passwords
-
C. Herley and P. Van Oorschot. A Research Agenda Acknowledging the Persistence of Passwords. IEEE Security & Privacy, 10(1):28-36, 2012.
-
(2012)
IEEE Security & Privacy
, vol.10
, Issue.1
, pp. 28-36
-
-
Herley, C.1
Van Oorschot, P.2
-
18
-
-
0003508558
-
-
National Institute of Standards and Technology (NIST), October
-
National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES) (FIPS PUB 197), October 2001.
-
(2001)
Advanced Encryption Standard (AES) (FIPS PUB 197)
-
-
-
20
-
-
81155140118
-
Why johnny still can't encrypt: Evaluating the usability of email encryption software
-
S. Sheng, C. Koranda, J. Hyland, and L. Broderick. Why Johnny Still Can't Encrypt: Evaluating the Usability of Email Encryption Software. In Proceedings of the Second Symposium on Usable Privacy and Security, Poster, 2006.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security, Poster
-
-
Sheng, S.1
Koranda, C.2
Hyland, J.3
Broderick, L.4
|