-
1
-
-
31144440543
-
Extended validation models in pki: Alternatives and implications
-
Sean Smith, editor, NIST, April, Retrieved 23-Feb-2005 from
-
Branchaud, M. and Linn, J. Extended validation models in PKI: Alternatives and implications. In Sean Smith, editor, Proceedings of the 1st Annual PKI Research Workshop, pages 37-43. NIST, April 2002. Retrieved 23-Feb-2005 from http://www.cs.dartmouth.edu/~pki02/Branchaud/.
-
(2002)
Proceedings of the 1st Annual PKI Research Workshop
, pp. 37-43
-
-
Branchaud, M.1
Linn, J.2
-
2
-
-
0004143444
-
-
July, Retrieved 23-Feb-2005 from
-
Cheskin Research. Trust in the Wired Americas. July 2000. Retrieved 23-Feb-2005 from http://www.cheskin.com/p/ar.asp?mlid=7.
-
(2000)
Trust in the Wired Americas
-
-
-
3
-
-
0037703521
-
Use of a p3p user agent by early adopters
-
ACM Press
-
Cranor, L.F., Arjula, M., and Guduru, P. Use of a P3P user agent by early adopters. In Proceeding of the ACM workshop on Privacy in the Electronic Society, pages 1-10. ACM Press, 2002.
-
(2002)
Proceeding of the ACM Workshop on Privacy in the Electronic Society
, pp. 1-10
-
-
Cranor, L.F.1
Arjula, M.2
Guduru, P.3
-
4
-
-
29244441470
-
Security day-to-day: User strategies for managing security as an everyday, practical problem
-
University of California, Irvine, June
-
Dourish, P., Grinter, R.E., Dalal, B., Delgado de la Flor, J. and Joseph, M. Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem. Technical Report UCI-ISR-03-5, Institute for Software Research, University of California, Irvine, June 2003.
-
(2003)
Technical Report UCI-ISR-03-5, Institute for Software Research
-
-
Dourish, P.1
Grinter, R.E.2
Dalal, B.3
Delgado De La Flor, J.4
Joseph, M.5
-
5
-
-
0034581037
-
Ten risks of pki: What you're not being told about public key infrastructure
-
Ellison, C. and Schneier, B. Ten risks of PKI: What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
6
-
-
84869039673
-
Prominence-interpretation theory: Explaining how people assess credibility online
-
Fort Lauderdale, Florida, USA, April 5-10, ACM Press
-
Fogg, B.J. Prominence-Interpretation Theory: Explaining How People Assess Credibility Online. In Conference Extended Abstracts on Human Factors in Computer Systems, pages 722- 723, Fort Lauderdale, Florida, USA, April 5-10 2003. ACM Press.
-
(2003)
Conference Extended Abstracts on Human Factors in Computer Systems
, pp. 722-723
-
-
Fogg, B.J.1
-
7
-
-
0002819636
-
Trust online
-
Friedman, B., Khan, P.H. Jr. and Howe, D.C. Trust online. Communications of the ACM, 43(12):34-40, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 34-40
-
-
Friedman, B.1
Khan Jr., P.H.2
Howe, D.C.3
-
8
-
-
0038049672
-
Users' conceptions of risks and harms on the web: A comparative study
-
Minneapolis, Minnesota, USA, April 20-25, ACM Press
-
Friedman, B., Nissenbaum, H., Hurley, D., Howe, D.C. and Felten, E. Users' Conceptions of Risks and Harms on the Web: A Comparative Study. In Conference Extended Abstracts on Human Factors in Computer Systems, pages 614-615, Minneapolis, Minnesota, USA, April 20-25, 2002. ACM Press.
-
(2002)
Conference Extended Abstracts on Human Factors in Computer Systems
, pp. 614-615
-
-
Friedman, B.1
Nissenbaum, H.2
Hurley, D.3
Howe, D.C.4
Felten, E.5
-
9
-
-
0038726078
-
Users' conceptions of web security: A comparative study
-
Minneapolis, Minnesota, USA, April 20-25, ACM Press
-
Friedman, B., Hurley, D., Howe, D.C., Felten, E. and Nissenbaum, H. Users' Conceptions of Web Security: A Comparative Study. In Conference Extended Abstracts on Human Factors in Computer Systems, pages 746-747, Minneapolis, Minnesota, USA, April 20-25, 2002. ACM Press.
-
(2002)
Conference Extended Abstracts on Human Factors in Computer Systems
, pp. 746-747
-
-
Friedman, B.1
Hurley, D.2
Howe, D.C.3
Felten, E.4
Nissenbaum, H.5
-
10
-
-
36549029964
-
Views, reactions and impact of digitally-signed mail in e-commerce
-
To appear in
-
Garfinkel, S.L., Schiller, J.I., Nordlander, E., Margrave, D. and Miller, R.C. Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. To appear in Proceedings of Financial Cryptography and Data Security, 2005.
-
(2005)
Proceedings of Financial Cryptography and Data Security
-
-
Garfinkel, S.L.1
Schiller, J.I.2
Nordlander, E.3
Margrave, D.4
Miller, R.C.5
-
11
-
-
0035031024
-
Cookies and web browser design: Toward realizing informed consent online
-
ACM Press
-
Millett, L.I., Friedman, B. and Felten, E. Cookies and Web browser design: Toward realizing informed consent online. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 46-52, 2001. ACM Press.
-
(2001)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 46-52
-
-
Millett, L.I.1
Friedman, B.2
Felten, E.3
|