The SCEAS System
Navigation Menu

Conferences in DBLP

Networked Systems Design and Implementation (nsdi)
2008 (conf/nsdi/2008upsec)

  1. IRBs and Security Research: Myths, Facts and Mission Creep. [Citation Graph (, )][DBLP]

  2. Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. [Citation Graph (, )][DBLP]

  3. A Framework for Reasoning About the Human in the Loop. [Citation Graph (, )][DBLP]

  4. Predicted and Observed User Behavior in the Weakest-link Security Game. [Citation Graph (, )][DBLP]

  5. Understanding Privacy Settings in Facebook with an Audience View. [Citation Graph (, )][DBLP]

  6. Where's The Beep? Security, Privacy, and User Misunderstandings of RFID. [Citation Graph (, )][DBLP]

  7. Centered Discretization with Application to Graphical Passwords. [Citation Graph (, )][DBLP]

  8. Ad-hoc Guesting: When Exceptions Are the Rule. [Citation Graph (, )][DBLP]

  9. RUST: A Retargetable Usability Testbed for Web Site Authentication Technologies. [Citation Graph (, )][DBLP]

  10. A User Study Design for Comparing the Security of Registration Protocols. [Citation Graph (, )][DBLP]

  11. iPhish: Phishing Vulnerabilities on Consumer Electronics. [Citation Graph (, )][DBLP]

  12. Biometric Daemons: Authentication via Electronic Pets. [Citation Graph (, )][DBLP]

  13. Using Salience Differentials to Making Visual Cues Noticeable. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002