Proceedings of the 2006 Symposium on Usable Privacy and Security

Conference Details

Year: 2006
Publisher: ACM Press

Description

Topics of SOUPS include, but are not limited to; innovative security or privacy functionality and design, new applications of existing models or technology, field studies of security or privacy technology, usability evaluations of security or privacy features or security testing of usability features, and lessons learned from deploying and using usable privacy and security features.

Other Years in Series

Other proceedings in the SOUPS - Symposium on Usable Privacy and Security series

Articles

Publications included in this conference proceedings

DeWitt, Alexander J., Kuljis, Jasna (2006): Aligning usability and security: a usability study of Polaris. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 1-7. https://cups.cs.cmu.edu/soups/2006/proceedings/p1-dewitt.pdf
Wu, Min, Miller, Robert C., Little, Greg (2006): Web wallet: preventing phishing attacks by revealing user intentions. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 102-113. https://cups.cs.cmu.edu/soups/2006/proceedings/p102_wu.pdf
Karger, Paul A. (2006): Privacy and security threat analysis of the federal employee personal identity verificatio. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 114-121. https://cups.cs.cmu.edu/soups/2006/slides/karger.pdf Slides
Newman, Richard, Gavette, Sherman, Yonge, Larry, Anderson, Ross (2006): Protecting domestic power-line communications. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 122-132. https://cups.cs.cmu.edu/soups/2006/proceedings/p122_newman.pdf
Gideon, Julia, Cranor, Lorrie, Egelman, Serge, Acquisti, Alessandro (2006): Power strips, prophylactics, and privacy, oh my!. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 133-144. https://cups.cs.cmu.edu/soups/2006/slides/egelman.ppt Slides
Rode, Jennifer Ann, Johansson, Carolina, DiGioia, Paul, Filho, Roberto Silva, Nies, Kari, Nguyen, David H., Ren, Jie, Dourish, Paul, Redmiles, David F. (2006): Seeing further: extending visualization as a basis for usable security. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 145-155. https://cups.cs.cmu.edu/soups/2006/slides/rode.pdf
Cao, Xiang, Iverson, Lee (2006): Intentional access management: making access control usable for end-users. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 20-31. https://cups.cs.cmu.edu/soups/2006/proceedings/p20_cao.pdf
Yee, Ka-Ping, Sitaker, Kragen (2006): Passpet: convenient password management and phishing protection. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 32-43. https://cups.cs.cmu.edu/soups/2006/slides/yee.pdf Slides
Gaw, Shirley, Felten, Edward (2006): Password management strategies for online accounts. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 44-55. https://cups.cs.cmu.edu/soups/2006/slides/gaw.ppt Slides
Tari, Furkan, Ozok, A. Ant, Holden, Stephen H. (2006): A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphic. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 56-66. https://cups.cs.cmu.edu/soups/2006/proceedings/p56_tari.pdf
Kuo, Cynthia, Romanosky, Sasha, Cranor, Lorrie Faith (2006): Human selection of mnemonic phrase-based passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 67-78. https://cups.cs.cmu.edu/soups/2006/slides/kuo.zip Slides
Downs, Julie S., Holbrook, Mandy B., Cranor, Lorrie Faith (2006): Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 79-90. https://cups.cs.cmu.edu/soups/2006/proceedings/p79_downs.pdf
Brodie, Carolyn A., Karat, Clare-Marie, Karat, John (2006): An empirical study of natural language parsing of privacy policy rules using the SPARCLE p. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 8-19. https://cups.cs.cmu.edu/soups/2006/proceedings/p8_brodie.pdf
Fu, Anthony Y., Deng, Xiaotie, Wenyin, Liu, Little, Greg (2006): The methodology and an application to fight against Unicode attacks. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 91-101. https://cups.cs.cmu.edu/soups/2006/proceedings/p91_fu.pdf
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,067+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
0
days
19
hrs
50
mins
12
secs

Free forever. No spam. Unsubscribe anytime.