-
1
-
-
0034459145
-
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
-
Ackerman MS (2000) The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Hum Comput Interact 15(2-3):179-203
-
(2000)
Hum Comput Interact
, vol.15
, Issue.2-3
, pp. 179-203
-
-
Ackerman, M.S.1
-
2
-
-
0043232732
-
Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures
-
Adams A, Sasse MA (1999) Users are not the enemy: why users compromise security mechanisms and how to take remedial measures. Commun ACM 42(12):40-46
-
(1999)
Commun ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
3
-
-
0242444871
-
Making passwords secure and usable
-
Thimbleby H, O'Connaill B, Thomas P (eds), Bristol, UK, August 1997. Springer, Berlin Heidelberg New York
-
Adams A, Sasse MA, Lunt P (1997) Making passwords secure and usable. In: Thimbleby H, O'Connaill B, Thomas P (eds) Proceedings of the HCI'97 conference on people and computers XII, Bristol, UK, August 1997. Springer, Berlin Heidelberg New York, pp 1-19
-
(1997)
Proceedings of the HCI'97 Conference on People and Computers XII
, pp. 1-19
-
-
Adams, A.1
Sasse, M.A.2
Lunt, P.3
-
4
-
-
0003508667
-
-
Brooks/Cole, Monterey, California
-
Altman I (1975) The environment and social behavior: privacy, personal space, territory, and crowding. Brooks/Cole, Monterey, California
-
(1975)
The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding
-
-
Altman, I.1
-
5
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, California, February 2002
-
Balfanz D, Smetters D, Stewart P, Wong H (2002) Talking to strangers: authentication in ad-hoc wireless networks. In: Proceedings of the network and distributed system security symposium (NDSS 2002), San Diego, California, February 2002
-
(2002)
Proceedings of the Network and Distributed System Security Symposium (NDSS 2002)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
7
-
-
0027764777
-
A cryptographic file system for UNIX
-
Fairfax, Virginia, November 1993. ACM Press, New York
-
Blaze M (1993) A cryptographic file system for UNIX. In: Proceedings of the 1st ACM conference on computer and communications security (CCS'93), Fairfax, Virginia, November 1993. ACM Press, New York, pp 9-16
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS'93)
, pp. 9-16
-
-
Blaze, M.1
-
8
-
-
0003429117
-
Are passfaces more usable than passwords? A field trial investigation
-
McDonald S, Waern Y, Cockton G (eds), Sunderland, UK, September 2000. Springer, Berlin Heidelberg New York
-
Brostoff S, Sasse MA (2000) Are passfaces more usable than passwords? A field trial investigation. In: McDonald S, Waern Y, Cockton G (eds) Proceedings of the HCI 2000 conference on people and computers XIV-usability or else!, Sunderland, UK, September 2000. Springer, Berlin Heidelberg New York, pp 405-424
-
(2000)
Proceedings of the HCI 2000 Conference on People and Computers XIV-usability or Else!
, pp. 405-424
-
-
Brostoff, S.1
Sasse, M.A.2
-
10
-
-
0242696305
-
An approach to usable security based on event monitoring and visualization
-
Virginia Beach, Virginia, September 2002. ACM Press, New York
-
Dourish P, Redmiles D (2002) An approach to usable security based on event monitoring and visualization. In: Proceedings of the ACM new security paradigms workshop (NSPW 2002), Virginia Beach, Virginia, September 2002. ACM Press, New York
-
(2002)
Proceedings of the ACM New Security Paradigms Workshop (NSPW 2002)
-
-
Dourish, P.1
Redmiles, D.2
-
11
-
-
0038726078
-
Users' conceptions of web security: A comparative study
-
Minneapolis, Minnesota, April 2002
-
Friedman B, Hurley D, Howe D, Felten E, Nissenbaum H (2002) Users' conceptions of web security: a comparative study. In: Proceedings of the CHI 2002 conference on human factors in computing systems, Minneapolis, Minnesota, April 2002
-
(2002)
Proceedings of the CHI 2002 Conference on Human Factors in Computing Systems
-
-
Friedman, B.1
Hurley, D.2
Howe, D.3
Felten, E.4
Nissenbaum, H.5
-
12
-
-
0036957029
-
Challenge: Recombinant computing and the speakeasy approach
-
Atlanta, Georgia, September 2002. ACM Press, New York
-
Edwards WK, Newman MW, Sedivy JZ, Smith TF, Izadi S (2002) Challenge: recombinant computing and the speakeasy approach. In: Proceedings of the 8th annual ACM international conference on mobile computing and networking (MobiCom 2002), Atlanta, Georgia, September 2002. ACM Press, New York
-
(2002)
Proceedings of the 8th Annual ACM International Conference on Mobile Computing and Networking (MobiCom 2002)
-
-
Edwards, W.K.1
Newman, M.W.2
Sedivy, J.Z.3
Smith, T.F.4
Izadi, S.5
-
14
-
-
0037481692
-
Instant messaging in teen life
-
New Orleans, Louisiana, November 2002. ACM Press, New York
-
Grinter R, Paled L (2002) Instant messaging in teen life. In: Proceedings of the ACM conference on computer-supported cooperative work (CSCW 2002), New Orleans, Louisiana, November 2002. ACM Press, New York pp 21-30
-
(2002)
Proceedings of the ACM Conference on Computer-supported Cooperative Work (CSCW 2002)
, pp. 21-30
-
-
Grinter, R.1
Paled, L.2
-
15
-
-
0038375488
-
Wan2tlk? Everyday text messaging
-
Fort Lauderdale, Florida, April 2003. ACM Press, New York
-
Grinter R, Eldridge M (2003) Wan2tlk? Everyday text messaging. In: Proceedings of the CHI 2003 conference on human factors in computing systems, Fort Lauderdale, Florida, April 2003. ACM Press, New York
-
(2003)
Proceedings of the CHI 2003 Conference on Human Factors in Computing Systems
-
-
Grinter, R.1
Eldridge, M.2
-
16
-
-
0033489646
-
Security service level agreements: Quantifiable security for the enterprise?
-
Ontario, Canada, September 1999. ACM Press, New York
-
Henning R (1999) Security service level agreements: quantifiable security for the enterprise? In: Proceedings of the ACM new security paradigm workshop (NSPW'99), Ontario, Canada, September 1999. ACM Press, New York, pp 54-60
-
(1999)
Proceedings of the ACM New Security Paradigm Workshop (NSPW'99)
, pp. 54-60
-
-
Henning, R.1
-
17
-
-
0034593275
-
Quality of security service
-
Cloudcroft, New Mexico, September 2001. ACM Press, New York
-
Irvine C, Levin T (2001) Quality of security service. In: Proceedings of the ACM new security paradigms workshop (NSPW 2001), Cloudcroft, New Mexico, September 2001. ACM Press, New York, pp 91-99
-
(2001)
Proceedings of the ACM New Security Paradigms Workshop (NSPW 2001)
, pp. 91-99
-
-
Irvine, C.1
Levin, T.2
-
18
-
-
33845622734
-
The interactive workspaces project: Experiences with ubiquitous computing rooms
-
Johanson B, Fox A, Winograd T (2002) The interactive workspaces project: experiences with ubiquitous computing rooms. IEEE Pervasive Comput 1(2):67-75
-
(2002)
IEEE Pervasive Comput
, vol.1
, Issue.2
, pp. 67-75
-
-
Johanson, B.1
Fox, A.2
Winograd, T.3
-
19
-
-
0142156649
-
Secure spontaneous device association
-
Seattle, Washington, October 2003. Lecture notes in computer science LNCS 2864, Springer, Berlin Heidelberg New York
-
Kindberg T, Zhang K (2003) Secure spontaneous device association. In: Proceedings of the 5th international conference on ubiquitous computing (Ubicomp 2003), Seattle, Washington, October 2003. Lecture notes in computer science LNCS 2864, Springer, Berlin Heidelberg New York
-
(2003)
Proceedings of the 5th International Conference on Ubiquitous Computing (Ubicomp 2003)
-
-
Kindberg, T.1
Zhang, K.2
-
20
-
-
0035570307
-
Special issue on contextaware computing
-
Moran T, Dourish P (eds) (2001) Special issue on contextaware computing. Hum Comput Interact 16(2-4):87
-
(2001)
Hum Comput Interact
, vol.16
, Issue.2-4
, pp. 87
-
-
Moran, T.1
Dourish, P.2
-
21
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
Fort Lauderdale, Florida, April 2003. ACM Press, New York
-
Palen L, Dourish P (2003) Unpacking "privacy" for a networked world. In: Proceedings of the CHI 2003 conference on human factors in computing systems, Fort Lauderdale, Florida, April 2003. ACM Press, New York
-
(2003)
Proceedings of the CHI 2003 Conference on Human Factors in Computing Systems
-
-
Palen, L.1
Dourish, P.2
-
22
-
-
84900517915
-
Examining users' repertoire of internet applications
-
Sasse MA, Johnson (eds), Edinburgh, Scotland, August/September 1999
-
Rimmer J, Wakeman I, Sheeran L, Sasse MA (1999) Examining users' repertoire of internet applications. In: Sasse MA, Johnson (eds) Proceedings of the 7th IFIP conference on human- computer interaction (Interact'99), Edinburgh, Scotland, August/September 1999
-
(1999)
Proceedings of the 7th IFIP Conference on Human- Computer Interaction (Interact'99)
-
-
Rimmer, J.1
Wakeman, I.2
Sheeran, L.3
Sasse, M.A.4
-
23
-
-
0036005221
-
Towards a typology of internet users and online privacy concerns
-
Sheehan K (2002) Towards a typology of internet users and online privacy concerns. Inf Soc 18:21-32
-
(2002)
Inf Soc
, vol.18
, pp. 21-32
-
-
Sheehan, K.1
-
24
-
-
0036297419
-
How web browsers shape users' understanding of networks
-
Sheeran L, Sasse A, Rimmer J, Wakeman I (2001) How web browsers shape users' understanding of networks. Electron Libr 20(1):35-42
-
(2001)
Electron Libr
, vol.20
, Issue.1
, pp. 35-42
-
-
Sheeran, L.1
Sasse, A.2
Rimmer, J.3
Wakeman, I.4
-
25
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
Virginia Beach, Virginia, September 2002. ACM Press, New York
-
Smetters D, Grinter R (2002) Moving from the design of usable security technologies to the design of useful secure applications. In: Proceedings of the ACM new security paradigms workshop (NSPW 2002), Virginia Beach, Virginia, September 2002. ACM Press, New York
-
(2002)
Proceedings of the ACM New Security Paradigms Workshop (NSPW 2002)
-
-
Smetters, D.1
Grinter, R.2
-
26
-
-
84949512612
-
Calculating costs for quality of security service
-
New Orleans, Louisiana, December 2000
-
Spyropoulou E, Levin T, Irvine C (2000) Calculating costs for quality of security service. In: Proceedings of the 16th annual computer security applications conference (ACSAC 2000), New Orleans, Louisiana, December 2000
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000)
-
-
Spyropoulou, E.1
Levin, T.2
Irvine, C.3
-
29
-
-
0242708745
-
Pretty good persuasion: A first step towards effective password security for the real world
-
Cloudcroft, New Mexico, September 2001. ACM Press, New York, pp 137-143
-
Weirich D, Sasse MA (2001) Pretty good persuasion: a first step towards effective password security for the real world. In: Proceedings of the ACM new security paradigms workshop (NSPW 2001), Cloudcroft, New Mexico, September 2001. ACM Press, New York, pp 137-143
-
(2001)
Proceedings of the ACM New Security Paradigms Workshop (NSPW 2001)
-
-
Weirich, D.1
Sasse, M.A.2
-
30
-
-
0001853125
-
The computer for the 21st century
-
Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94-104
-
(1991)
Sci Am
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
31
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):74-83
-
(1993)
Commun ACM
, vol.36
, Issue.7
, pp. 74-83
-
-
Weiser, M.1
-
34
-
-
84926001904
-
User-centered security
-
Lake Arrowhead, California, September 1996. ACM Press, New York
-
Zurko ME, Simon R (1996) User-centered security. In: Proceedings of the ACM new security paradigms workshop (NSPW'96), Lake Arrowhead, California, September 1996. ACM Press, New York
-
(1996)
Proceedings of the ACM New Security Paradigms Workshop (NSPW'96)
-
-
Zurko, M.E.1
Simon, R.2
|