-
1
-
-
84890107028
-
Here's my cert, so trust me, Maybe? Understanding TLS errors on the web
-
AKHAWE, D., AMANN, B., VALLENTIN, M., and SOMMER, R. Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web. In Proceedings of the 2013 World Wide Web Conference (2013).
-
(2013)
Proceedings of the 2013 World Wide Web Conference
-
-
Akhawe, D.1
Amann, B.2
Vallentin, M.3
Sommer, R.4
-
3
-
-
74049152241
-
Browser interfaces and extended validation SSL certificates: An empirical study
-
BIDDLE, R., VAN OORSCHOT, P. C., PATRICK, A. S., SOBEY, J., AND WHALEN, T. Browser interfaces and extended validation SSL certificates: an empirical study. In Proceedings of the ACM Workshop on Cloud Computing Security (2009).
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security
-
-
Biddle, R.1
Van Oorschot, P.C.2
Patrick, A.S.3
Sobey, J.4
Whalen, T.5
-
5
-
-
79953645142
-
Bridging the gap in computer security warnings: A mental model approach
-
March
-
BRAVO-LILLO, C., CRANOR, L. F., and DOWNS., J. S., and KO-MANDURI, S. Bridging the Gap in Computer Security Warnings: A Mental Model Approach. In IEEE Security and Privacy (March 2011), Vol. 9.
-
(2011)
IEEE Security and Privacy
, vol.9
-
-
Bravo-Lillo, C.1
Cranor, L.F.2
Downs, J.S.3
Ko-Manduri, S.4
-
6
-
-
3543046653
-
A practical guide to experience-sampling procedures
-
CHRISTENSEN, T., BARRETT, L., BLISS-MOREAU, E., LEBO, K., and KASCHUB, C. A Practical Guide to Experience-Sampling Procedures. In Journal of Happiness Studies (2003), Vol. 4.
-
(2003)
Journal of Happiness Studies
, vol.4
-
-
Christensen, T.1
Barrett, L.2
Bliss-Moreau, E.3
Lebo, K.4
Kaschub, C.5
-
8
-
-
84893145245
-
-
CHROMIUM AUTHORS. HSTS Preload and Certificate Pinning List. https://src.chromium.org/viewvc/chrome/trunk/src/net/base/transport_security_state_static.json.
-
HSTS Preload and Certificate Pinning List
-
-
-
9
-
-
3042780572
-
Using the experience sampling method to evaluate ubicomp applications
-
CONSOLVO, S., and WALKER, M. Using the Experience Sampling Method to Evaluate Ubicomp Applications. In Pervasive Computing (2003).
-
(2003)
Pervasive Computing
-
-
Consolvo, S.1
Walker, M.2
-
10
-
-
85080799042
-
-
Convergence. http://www.convergence.io.
-
-
-
-
14
-
-
85044855162
-
How to ask for permission
-
FELT, A. P., EGELMAN, S., FINIFTER, M., AKHAWE, D., and WAGNER, D. How to ask for permission. In Proceedings of the USENIX Conference on Hot Topics in Security (HotSec) (2012).
-
(2012)
Proceedings of the USENIX Conference on Hot Topics in Security (HotSec)
-
-
Felt, A.P.1
Egelman, S.2
Finifter, M.3
Akhawe, D.4
Wagner, D.5
-
15
-
-
0038726078
-
Users' conceptions of web security: A comparative study
-
FRIEDMAN, B., HURLEY, D., HOWE, D. C., FELTEN, E., and NISSENBAUM, H. Users' Conceptions of Web Security: A Comparative Study. In CHI Extended Abstracts on Human Factors in Computing Systems (2002).
-
(2002)
CHI Extended Abstracts on Human Factors in Computing Systems
-
-
Friedman, B.1
Hurley, D.2
Howe, D.C.3
Felten, E.4
Nissenbaum, H.5
-
18
-
-
82955197322
-
The ssl landscape: A thorough analysis of the x.509 pki using active and passive measurements
-
HOLZ, R., BRAUN, L., KAMMENHUBER, N., and CARLE, G. The ssl landscape: a thorough analysis of the x.509 pki using active and passive measurements. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC) (2011).
-
(2011)
Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC)
-
-
Holz, R.1
Braun, L.2
Kammenhuber, N.3
Carle, G.4
-
19
-
-
77952351130
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
JACKSON, C., and SIMON., D. R., TAN, D. S., and BARTH, A. An evaluation of extended validation and picture-in-picture phishing attacks. In Proceedings of the Workshop on Usable Security (USEC) (2007).
-
(2007)
Proceedings of the Workshop on Usable Security (USEC)
-
-
Jackson, C.1
Simon, D.R.2
Tan, D.S.3
Barth, A.4
-
24
-
-
85080726476
-
-
August
-
NETCRAFT. Phishing on sites using ssl certificates, August 2012. http://news.netcraft.com/archives/2012/08/22/phishing-on-sites-using-ssl-certificates.html.
-
(2012)
Phishing on Sites Using Ssl Certificates
-
-
-
27
-
-
74049155648
-
The emperor's new security indicators
-
SCHECHTER, S. E., DHAMIJA, R., OZMENT, A., and FISCHER, I. The Emperor's New Security Indicators. In Proceedings of the IEEE Symposium on Security and Privacy (2007).
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
28
-
-
12544250445
-
Experience sampling: Promises and pitfalls, strengths and weaknesses
-
SCOLLON, C. N., KIM-PRIETO, C., and DIENER, E. Experience Sampling: Promises and Pitfalls, Strengths and Weaknesses. In Journal of Happiness Studies (2003), Vol. 4.
-
(2003)
Journal of Happiness Studies
, vol.4
-
-
Scollon, C.N.1
Kim-Prieto, C.2
Diener, E.3
-
29
-
-
79952609371
-
Exploring user reactions to new browser cues for extended validation certificates
-
SOBEY, J., BIDDLE, R., VAN OORSCHOT, P., and PATRICK, A. S. Exploring user reactions to new browser cues for extended validation certificates. In Proceedings of the European Symposium on Research in Computer Security (2008).
-
(2008)
Proceedings of the European Symposium on Research in Computer Security
-
-
Sobey, J.1
Biddle, R.2
Van Oorschot, P.3
Patrick, A.S.4
-
31
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
SUNSHINE, J., EGELMAN, S., ALMUHIMEDI, H., ATRI, N., and CRANOR, L. F. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the USENIX Security Symposium (2009).
-
(2009)
Proceedings of the USENIX Security Symposium
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
32
-
-
85080649557
-
Factors and principles affecting the usability of four E-commerce sites
-
TILSON, R., DONG, J., MARTIN, S., and KIEKE, E. Factors and Principles Affecting the Usability of Four E-commerce Sites. In Our Global Community Conference Proceedings (1998).
-
(1998)
Our Global Community Conference Proceedings
-
-
Tilson, R.1
Dong, J.2
Martin, S.3
Kieke, E.4
|