-
1
-
-
36849077630
-
Improving security decisions with polymorphic and audited dialogs
-
New York, NY, USA, ACM Press
-
J. C. Brustoloni and R. Villamarín-Salomón. Improving security decisions with polymorphic and audited dialogs. In Proceedings of the 3rd symposium on Usable privacy and security, pages 76–85, New York, NY, USA, 2007. ACM Press.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security
, pp. 76-85
-
-
Brustoloni, J.C.1
Villamarín-Salomón, R.2
-
2
-
-
85080774330
-
-
Accessed: July 27
-
Certification Authority/Browser Forum. Extended validation SSL certificates, Accessed: July 27, 2007. http://cabforum.org/.
-
(2007)
Extended Validation SSL Certificates
-
-
-
3
-
-
84893108843
-
A framework for reasoning about the human in the loop
-
Berkeley, CA, USA, USENIX Association
-
L. F. Cranor. A framework for reasoning about the human in the loop. In Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1–15, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
Proceedings of the 1st Conference on Usability, Psychology, and Security
, pp. 1-15
-
-
Cranor, L.F.1
-
4
-
-
33745816410
-
Why phishing works
-
New York, NY, USA, ACM
-
R. Dhamija, J. D. Tygar, and M. Hearst. Why phishing works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 581–590, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
5
-
-
85080689245
-
-
I. E-Soft. February 1
-
I. E-Soft. SSL server survey, February 1, 2007. http://www.securityspace.com/s survey/sdata/200701/ certca.html.
-
(2007)
SSL Server Survey
-
-
-
6
-
-
57649166927
-
You’ve been warned: An empirical study of the effectiveness of web browser phishing warnings
-
New York, NY, USA, ACM
-
S. Egelman, L. F. Cranor, and J. Hong. You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceeding of the SIGCHI Conference on Human Factors in Computing Systems, pages 1065–1074, New York, NY, USA, 2008. ACM.
-
(2008)
Proceeding of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 1065-1074
-
-
Egelman, S.1
Cranor, L.F.2
Hong, J.3
-
7
-
-
0035034830
-
What makes web sites credible? A report on a large quantitative study
-
Seattle, WA, March 31 April 4, ACM
-
B. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, N. Fang, J. Paul, A. Rangekar, J. Shon, P. Swani, and M. Treinen. What makes web sites credible? a report on a large quantitative study. In Proceedings of the SIGCHI Conference on in Computing Systems, Seattle, WA, March 31 - April 4, 2001. ACM.
-
(2001)
Proceedings of the SIGCHI Conference on in Computing Systems
-
-
Fogg, B.1
Marshall, J.2
Laraki, O.3
Osipovich, A.4
Varma, C.5
Fang, N.6
Paul, J.7
Rangekar, A.8
Shon, J.9
Swani, P.10
Treinen, M.11
-
8
-
-
0038726078
-
Users’ conceptions of web security: A comparative study
-
New York, NY, USA, ACM
-
B. Friedman, D. Hurley, D. C. Howe, E. Felten, and H. Nissenbaum. Users’ conceptions of web security: a comparative study. In Extended Abstracts on Human Factors in Computing Systems, pages 746–747, New York, NY, USA, 2002. ACM.
-
(2002)
Extended Abstracts on Human Factors in Computing Systems
, pp. 746-747
-
-
Friedman, B.1
Hurley, D.2
Howe, D.C.3
Felten, E.4
Nissenbaum, H.5
-
10
-
-
57349089194
-
ForcehtTPS: Protecting high-security web sites from network attacks
-
New York, NY, USA, ACM
-
C. Jackson and A. Barth. ForceHTTPS: protecting high-security web sites from network attacks. In Proceeding of the 17th International World Wide Web Conference, pages 525–534, New York, NY, USA, 2008. ACM.
-
(2008)
Proceeding of the 17th International World Wide Web Conference
, pp. 525-534
-
-
Jackson, C.1
Barth, A.2
-
11
-
-
38549121705
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
Berlin / Heidelberg, Germany, February Springer
-
C. Jackson, D. R. Simon, D. S. Tan, and A. Barth. An evaluation of extended validation and picture-in-picture phishing attacks. In Proceeding of the 1st International Workshop on Usable Security, pages 281–293, Berlin / Heidelberg, Germany, February 2007. Springer.
-
(2007)
Proceeding of the 1st International Workshop on Usable Security
, pp. 281-293
-
-
Jackson, C.1
Simon, D.R.2
Tan, D.S.3
Barth, A.4
-
14
-
-
84855681990
-
-
Self-published Online Essay, Accessed: January 15
-
A. Patrick. Commentary on research on new security indicators. Self-published Online Essay, Accessed: January 15, 2009. http://www.andrewpatrick.ca/essays/commentary-on-research-on-new-security-indicators/.
-
(2009)
Commentary on Research on New Security Indicators
-
-
Patrick, A.1
-
16
-
-
80052807260
-
Firefox and the worry free web
-
L. F. Cranor and S. Garfinkel, editors, O’Reilly Media, Inc., Sebastopol, CA, USA, August
-
B. Ross. Firefox and the worry free web. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, pages 577–588. O’Reilly Media, Inc., Sebastopol, CA, USA, August 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 577-588
-
-
Ross, B.1
-
17
-
-
34548786769
-
The emperor’s new security indicators
-
Washington, DC, USA, IEEE Computer Society
-
S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The emperor’s new security indicators. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 51–65, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
18
-
-
57149083110
-
Exploring user reactions to new browser cues for extended validation certificates
-
J. Sobey, R. Biddle, P. C. van Oorschot, and A. S. Patrick. Exploring user reactions to new browser cues for extended validation certificates. In Proceedings of the 13th European Symposium on Research in Computer Security, pages 411–427, 2008.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security
, pp. 411-427
-
-
Sobey, J.1
Biddle, R.2
Van Oorschot, P.C.3
Patrick, A.S.4
-
19
-
-
11144338913
-
Intended and unintended consequences of warning messages: A review and synthesis of empirical research
-
D. W. Stewart and I. M. Martin. Intended and unintended consequences of warning messages: A review and synthesis of empirical research. Journal of Public Policy & Marketing, 13(1):1–1, 1994.
-
(1994)
Journal of Public Policy & Marketing
, vol.13
, Issue.1
, pp. 1
-
-
Stewart, D.W.1
Martin, I.M.2
-
20
-
-
85034040740
-
Perspectives: Improving SSH-style host authentication with multi-path probing
-
Berkeley, CA, USA, June USENIX Association
-
D. Wendlandt, D. G. Andersen, and A. Perrig. Perspectives: Improving SSH-style host authentication with multi-path probing. In Proceedings of the 2008 USENIX Annual Technical Conference, Berkeley, CA, USA, June 2008. USENIX Association.
-
(2008)
Proceedings of the 2008 USENIX Annual Technical Conference
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
21
-
-
32244434492
-
Gathering evidence: Use of visual security cues in web browsers
-
Victoria, British Columbia
-
T. Whalen and K. M. Inkpen. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of the 2005 Conference on Graphics Interface, pages 137–144, Victoria, British Columbia, 2005.
-
(2005)
Proceedings of the 2005 Conference on Graphics Interface
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.M.2
-
22
-
-
44349146652
-
Purpose and scope of warnings
-
M. Wogalter, editor, Lawrence Erlbaum Associates, Mahway, NJ, USA
-
M. Wogalter. Purpose and scope of warnings. In M. Wogalter, editor, Handbook of Warnings, pages 3–9. Lawrence Erlbaum Associates, Mahway, NJ, USA, 2006.
-
(2006)
Handbook of Warnings
, pp. 3-9
-
-
Wogalter, M.1
-
23
-
-
33745867321
-
Do security tool-bars actually prevent phishing attacks?
-
New York, NY, USA, ACM
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do security tool-bars actually prevent phishing attacks? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 601–610, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
-
24
-
-
33846283646
-
Hardening web browsers against man-in-the-middle and eavesdropping attacks
-
New York, NY, USA, ACM
-
H. Xia and J. C. Brustoloni. Hardening web browsers against man-in-the-middle and eavesdropping attacks. In Proceedings of the 14th International World Wide Web Conference, pages 489–498, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 14th International World Wide Web Conference
, pp. 489-498
-
-
Xia, H.1
Brustoloni, J.C.2
|