The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SOUPS"( http://dblp.L3S.de/Venues/SOUPS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/soups

Publication years (Num. hits)
2005-2006 (26) 2007 (30) 2008-2009 (68) 2010 (17) 2011 (16) 2012 (15) 2013 (16) 2014 (22) 2015 (23) 2016 (23) 2017 (47) 2023 (33)
Publication types (Num. hits)
inproceedings(323) proceedings(13)
Venues (Conferences, Journals, ...)
SOUPS(336)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 282 occurrences of 151 keywords

Results
Found 336 publication records. Showing 336 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Johnny Lim Defeat spyware with anti-screen capture technology using visual persistence. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sara Motahari, Constantine N. Manikopoulos, Starr Roxanne Hiltz, Quentin Jones Seven privacy worries in ubiquitous social computing. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1José Carlos Brustoloni, Ricardo Villamarín-Salomón Improving security decisions with polymorphic and audited dialogs. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF audited dialogs, context-sensitive guidance, e-mail client, polymorphic dialogs, virus propagation, attachment
1David Botta, Rodrigo Werlinger, André Gagné, Konstantin Beznosov, Lee Iverson, Sidney S. Fels, Brian D. Fisher Towards understanding IT security professionals and their tools. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security tasks, collaboration, ethnography, usable security, security management, security tools
1Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea Lessons learned from the deployment of a smartphone-based access-control system. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, usability, mobile computing, access control, smartphones
1Ahmet Emir Dirik, Nasir D. Memon, Jean-Camille Birget Modeling user choice in the PassPoints graphical password scheme. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF password entropy, user behavior, graphical passwords, dictionary attack
1Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith TwoKind authentication: usable authenticators for untrustworthy environments. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rosa R. Heckle, Andrew S. Patrick, A. Ant Ozok Perception and acceptance of fingerprint biometric technology. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Di Lin, Paul Dunphy, Patrick Olivier, Jeff Yan Graphical passwords & qualitative spatial relations. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rajah James, Woo Tae Kim, Aleecia M. McDonald, Robert McGuire A usability evaluation of a home monitoring system. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alexander J. DeWitt, Jasna Kuljis Aligning usability and security: a usability study of Polaris. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HCI-SEC, Polaris, usable security
1Richard E. Newman, Sherman Gavette, Larry Yonge, Ross J. Anderson Protecting domestic power-line communications. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF power-line communication, security, authentication
1Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little The methodology and an application to fight against Unicode attacks. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure web identity, spam, phishing, Unicode
1Ka-Ping Yee, Kragen Sitaker Passpet: convenient password management and phishing protection. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Min Wu 0005, Robert C. Miller, Greg Little Web wallet: preventing phishing attacks by revealing user intentions. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-commerce, user study, user interface design, world wide web and hypermedia
1Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor Decision strategies and susceptibility to phishing. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF phishing, mental models, qualitative methods
1Jennifer Ann Rode, Carolina Johansson, Paul DiGioia, Roberto Silveira Silva Filho, Kari Nies, David H. Nguyen, Jie Ren 0001, Paul Dourish, David F. Redmiles Seeing further: extending visualization as a basis for usable security. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF configuration in action, effective security, peer-to-peer file sharing, theoretical security, user and media characterization, user study, history, usable security, dynamic visualizations
1Shirley Gaw, Edward W. Felten Password management strategies for online accounts. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password reuse, security, survey, password, user behavior, password management
1Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti Power strips, prophylactics, and privacy, oh my! Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-commerce, user studies, search engines, privacy policies, P3P
1Furkan Tari, A. Ant Ozok, Stephen H. Holden A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, human factors, usable security, graphical passwords, social engineering, shoulder surfing, password security
1Carolyn Brodie, Clare-Marie Karat, John Karat An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, privacy, design, usability, policy, social and legal issues
1Xiang Cao, Lee Iverson Intentional access management: making access control usable for end-users. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intentional access management, usability, access control, WebDAV
1Lorrie Faith Cranor (eds.) Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  BibTeX  RDF
1Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor Human selection of mnemonic phrase-based passwords. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mnemonic phrases, password cracking, password selection, user studies
1Paul A. Karger Privacy and security threat analysis of the federal employee personal identity verification (PIV) program. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, smart cards, personal identification
1Carolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng Usable security and privacy: a case study of developing privacy management tools. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, design, privacy policies, social and legal issues
1Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan Stopping spyware at the gate: a user study of privacy, notice and spyware. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EULA, ToS, end user license agreement, notice, security and usability, terms of service, privacy, spyware
1Lorrie Faith Cranor (eds.) Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005 Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  BibTeX  RDF
1Giovanni Iachello, Ian E. Smith, Sunny Consolvo, Mike Y. Chen, Gregory D. Abowd Developing privacy guidelines for social location disclosure applications and services. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF people finder, social mobile applications, privacy, prototyping, iterative design
1Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David F. Redmiles, Jie Ren 0001, Jennifer Ann Rode, Roberto Silveira Silva Filho Two experiences designing for effective security. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF YANCEES, effective security, event-based architecture, impromptu, peer-to-peer file-sharing application, privacy practices, theoretical security, vavoom, visualization, usable security
1Gregory J. Conti, Mustaque Ahamad, John T. Stasko Attacking information visualization system usability overloading and deceiving the human. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial of information, malicious visualizations, usability attacks, information visualization, secure visualization
1Simson L. Garfinkel, Robert C. Miller Johnny 2: a user test of key continuity management with S/MIME and Outlook Express. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF user interaction design, Usability, e-commerce, user studies
1Susan Wiedenbeck, Jim Waters, Jean-Camille Birget, Alex Brodskiy, Nasir D. Memon Authentication using graphical passwords: effects of tolerance and image choice. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PassPoints, password images, authentication, human factors, usable security, tolerance, graphical passwords, password security
1John Sören Pettersson, Simone Fischer-Hübner, Ninni Danielsson, Jenny Nilsson, Mike Bergmann, Sebastian Clauß, Thomas Kriegelstein, Henry Krasemann Making PRIME usable. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF HCI, identity management, privacy-enhancing technologies
1Rachna Dhamija, J. Doug Tygar The battle against phishing: Dynamic Security Skins. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Paul DiGioia, Paul Dourish Social navigation as a model for usable security. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF peer-to-peer filesharing, visualization, social navigation, collaborative interfaces
Displaying result #301 - #336 of 336 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license