ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
Latest Publications
TOTAL DOCUMENTS
29
(FIVE YEARS 0)
H-INDEX
14
(FIVE YEARS 0)
Published By ACM Press
9781595938015
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
End user concern about security and privacy threats
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280711
◽
2007
◽
Cited By ~ 8
Author(s):
Joshua B. Gross
◽
Mary Beth Rosson
Keyword(s):
Security And Privacy
◽
End User
◽
Privacy Threats
Download Full-text
A usability evaluation of a home monitoring system
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280699
◽
2007
◽
Author(s):
Rajah James
◽
Woo Tae Kim
◽
Aleecia M. McDonald
◽
Robert McGuire
Keyword(s):
Monitoring System
◽
Home Monitoring
◽
Usability Evaluation
Download Full-text
Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280689
◽
2007
◽
Cited By ~ 23
Author(s):
Lujo Bauer
◽
Lorrie Faith Cranor
◽
Michael K. Reiter
◽
Kami Vaniea
Keyword(s):
Control System
◽
Access Control
◽
Lessons Learned
◽
Access Control System
Download Full-text
Seven privacy worries in ubiquitous social computing
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280713
◽
2007
◽
Cited By ~ 12
Author(s):
Sara Motahari
◽
Constantine Manikopoulos
◽
Roxanne Hiltz
◽
Quentin Jones
Keyword(s):
Social Computing
Download Full-text
Establishing darknet connections
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280700
◽
2007
◽
Cited By ~ 4
Author(s):
John Bethencourt
◽
Wai Yong Low
◽
Isaac Simmons
◽
Matthew Williamson
Download Full-text
Improving security decisions with polymorphic and audited dialogs
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280691
◽
2007
◽
Cited By ~ 18
Author(s):
José Carlos Brustoloni
◽
Ricardo Villamarín-Salomón
Download Full-text
A survey of privacy concerns with dynamic collaborator discovery capabilities
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280707
◽
2007
◽
Author(s):
Robert L. Marchant
Keyword(s):
Privacy Concerns
Download Full-text
Secure software installation in a mobile environment
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280705
◽
2007
◽
Cited By ~ 3
Author(s):
Andreas P. Heiner
◽
N. Asokan
Keyword(s):
Mobile Environment
◽
Secure Software
Download Full-text
Bitfrost
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280697
◽
2007
◽
Cited By ~ 5
Author(s):
Ivan Krstić
◽
Simson L. Garfinkel
Download Full-text
Is FacePIN secure and usable?
Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07
◽
10.1145/1280680.1280710
◽
2007
◽
Cited By ~ 4
Author(s):
Paul Dunphy
◽
Jeff Yan
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close