Detecting Cognitive Causes of Confidentiality Leaks
Electronic Notes in Theoretical Computer Science (ENTCS)
E-Prime for security: a new security paradigm
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Talc: using desktop graffiti to fight software vulnerability
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Security and usability: the gap in real-world online banking
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
So long, and no thanks for the externalities: the rational rejection of security advice by users
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Influencing mental models of security: a research agenda
Proceedings of the 2011 workshop on New security paradigms workshop
An empirical study of visual security cues to prevent the SSLstripping attack
Proceedings of the 27th Annual Computer Security Applications Conference
Stories as informal lessons about security
Proceedings of the Eighth Symposium on Usable Privacy and Security
Supporting visual security cues for WebView-based Android apps
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.01 |
When will we be secure? Nobody knows for surebut it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, ...