![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
SOUPS 2013: Newcastle, UK
- Lujo Bauer, Konstantin Beznosov, Lorrie Faith Cranor:
Symposium On Usable Privacy and Security, SOUPS '13, Newcastle, United Kingdom, July 24-26, 2013. ACM 2013, ISBN 978-1-4503-2319-2
Authentication and authorization
- Christopher Thompson, Maritza L. Johnson, Serge Egelman
, David A. Wagner, Jennifer King
:
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources. 1:1-1:14 - Matthias Beckerle, Leonardo A. Martucci:
Formal definitions for usable access control rule sets from goals to metrics. 2:1-2:11 - Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason I. Hong
, Ian Oakley
:
CASA: context-aware scalable authentication. 3:1-3:10
SOUPS de jour
- Oshrat Ayalon, Eran Toch
:
Retrospective privacy: managing longitudinal privacy in online social networks. 4:1-4:13 - Scott Ruoti
, Nathan Kim, Ben Burgon, Timothy W. van der Horst, Kent E. Seamons
:
Confused Johnny: when automatic encryption leads to confusion and mistakes. 5:1-5:12 - Cristian Bravo-Lillo
, Saranga Komanduri, Lorrie Faith Cranor
, Robert W. Reeder, Manya Sleeper, Julie S. Downs
, Stuart E. Schechter:
Your attention please: designing security-decision UIs to make genuine risks harder to ignore. 6:1-6:12
Privacy
- Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako
, Richard Shay, Lujo Bauer
, Mihai Christodorescu, Lorrie Faith Cranor
:
What matters to users?: factors that affect users' willingness to share information with online advertisers. 7:1-7:12 - Lalit Agarwal, Nisheeth Shrivastava, Sharad Jaiswal, Saurabh Panjwani:
Do not embarrass: re-examining user concerns for online tracking and advertising. 8:1-8:13 - Idris Adjerid
, Alessandro Acquisti
, Laura Brandimarte, George Loewenstein:
Sleights of privacy: framing, disclosures, and the limits of transparency. 9:1-9:11
Mobile devices
- Dirk Van Bruggen, Shu Liu, Mitch Kajzer, Aaron Striegel
, Charles R. Crowell, John D'Arcy:
Modifying smartphone user locking behavior. 10:1-10:14 - Florian Schaub
, Marcel Walch, Bastian Könings, Michael Weber:
Exploring the design space of graphical passwords on smartphones. 11:1-11:14 - Rebecca Balebako
, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor
, Carolyn Nguyen:
"Little brothers watching you": raising awareness of data leaks on smartphones. 12:1-12:11
Passwords
- Sascha Fahl, Marian Harbach
, Yasemin Acar, Matthew Smith:
On the ecological validity of a password study. 13:1-13:13 - Julie Thorpe
, Brent MacRae, Amirali Salehi-Abari:
Usability and security evaluation of GeoPass: a geographic location-password scheme. 14:1-14:14 - Elizabeth Stobert, Robert Biddle:
Memory retrieval and graphical passwords. 15:1-15:14
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.