Papers

Search results

    ConferenceTitleAuthor(s)
    SOUPS 2016The Cybersecurity Competition Experience: Perceptions from Cybersecurity WorkersColin Wee, Masooda Bashir, Nasir Memon
    SOUPS 2016Collaborative Data Analysis and Discovery for Cyber SecurityDiane Staheli, Vincent Mancuso, Raul Harnasch, Cody Fulcher, Madeline Chmielinski, Adam Kearns, Stephen Kelly, Era Vuksani
    SOUPS 2016Strengthening Password-based AuthenticationScott Ruoti, Jeff Andersen, Kent Seamons
    SOUPS 2016Standard Metrics and Scenarios for Usable AuthenticationScott Ruoti, Kent Seamons
    SOUPS 2016Who Are You? It Depends (On What You Ask Me!): Context-Dependent Dynamic User AuthenticationRaghav V. Sampangi, Kirstie Hawkey
    SOUPS 2016Exploring Games for Improved Touchscreen Authentication on Mobile DevicesPadmaja Scindia, Jonathan Voris
    SOUPS 2016Social Authentication for End-to-End EncryptionElham Vaziripour, Mark O'Neill, Justin Wu, Scott Heidbrink, Kent Seamons, Daniel Zappala
    SOUPS 2016Authentication Feature and Model Selection using Penalty AlgorithmsRahul Murmuria, Angelos Stavrou
    SOUPS 2016Who Are You Now? Fading to Multiple PersonasSven Dietrich, Michael Brenner, Katharina Krombholz
    SOUPS 2016Examining Visual-Spatial Paths for Mobile AuthenticationDavid Lu, Taehoon Lee, Sauvik Das, Jason Hong
    SOUPS 2016Position Paper: Measuring the Impact of Alphabet and Culture on Graphical Passwords Adam J. Aviv, Markus Dürmuth, Payas Gupta
    SOUPS 2016Towards Improving the Memorability of System-assigned Random Passwords
    SOUPS 2016Effect of Cognitive Effort on Password ChoiceThomas Groß, Kovila P.L. Coopamootoo, Amina Al-Jabri
    SOUPS 2016Implications of the Use of Emojis in Mobile AuthenticationLydia Kraus, Robert Schmidt, Marcel Walch, Florian Schaub, Christopher Krügelstein, Sebastian Möller
    SOUPS 2016Advancing the Understanding of Android Unlocking and UsageLina Qiu, Ildar Muslukhov, Konstantin Beznosov
    SOUPS 2016Picking a (Smart)Lock: Locking Relationships on Mobile DevicesElizabeth Stobert, David Barrera
    SOUPS 2016Privacy Wedges: Area-Based Audience Selection for Social Network PostsFrederic Raber, Alexander De Luca, Moritz Graus
    SOUPS 2016Influence of Privacy Attitude and Privacy Cue Framing on Android App ChoicesPrashanth Rajivan, Jean Camp
    SOUPS 2016The Privacy Policy ParadoxRena Coen, Jennifer King, Richmond Wong
    SOUPS 2016Reasonable Expectations of Privacy IndicatorsErin Kenneally
    SOUPS 2016Better Privacy Indicators: A New Approach to Quantification of Privacy PoliciesManar Alohaly, Hassan Takabi
    SOUPS 2016Rating Indicator Criteria for Privacy PoliciesJoel R. Reidenberg, N. Cameron Russell, Thomas B. Norton
    SOUPS 2016Data-Driven Privacy IndicatorsHamza Harkous, Rameez Rahman, Karl Aberer
    SOUPS 2016Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular UsersRoss Koppel, Jim Blythe, Vijay Kothari, Sean Smith
    SOUPS 2016Applying Cognitive Control Modes to Identify Security Fatigue HotspotsSimon Parkin, Kat Krol, Ingolf Becker, M. Angela Sasse

Pages