|
Conferences in DBLP
IRBs and Security Research: Myths, Facts and Mission Creep. [Citation Graph (, )][DBLP]
Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. [Citation Graph (, )][DBLP]
A Framework for Reasoning About the Human in the Loop. [Citation Graph (, )][DBLP]
Predicted and Observed User Behavior in the Weakest-link Security Game. [Citation Graph (, )][DBLP]
Understanding Privacy Settings in Facebook with an Audience View. [Citation Graph (, )][DBLP]
Where's The Beep? Security, Privacy, and User Misunderstandings of RFID. [Citation Graph (, )][DBLP]
Centered Discretization with Application to Graphical Passwords. [Citation Graph (, )][DBLP]
Ad-hoc Guesting: When Exceptions Are the Rule. [Citation Graph (, )][DBLP]
RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. [Citation Graph (, )][DBLP]
A User Study Design for Comparing the Security of Registration Protocols. [Citation Graph (, )][DBLP]
iPhish: Phishing Vulnerabilities on Consumer Electronics. [Citation Graph (, )][DBLP]
Biometric Daemons: Authentication via Electronic Pets. [Citation Graph (, )][DBLP]
Using Salience Differentials to Making Visual Cues Noticeable. [Citation Graph (, )][DBLP]
|