Users' Perceptions of Chrome's Compromised Credential Notification - Yue Huang et al - Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov, Users' Perceptions of Chrome’s Compromised Credential Notification, In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022): - LERSSE-RefConfPaper-2022-003
 
People who viewed this page also viewed:
(340)  SoK: The Dual Nature of Technology in Sexual Abuse - Borke Obada-Obieh, et al - Borke Obada-Obieh,Yue Huang, Lucrezia Spagnolo, & Konstantin Beznosov. (2022, May). SoK: The Dual Nature of Technology in Sexual Assault. In Proceedings of the Forty-Third Symposium of the Institute of Electrical and Electronics Engineers, Security and Privacy (IEEE S&P 2022): - LERSSE-RefConfPaper-2022-002
(321)  COVID-19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention - Yue Huang et al - Yue Huang, Borke Obada-Obieh, Elissa M. Redmiles, Satya Lokam, and Konstantin Beznosov. 2022. COVID 19 Information-Tracking Solutions: A Qualitative Investigation of the Factors Influencing People’s Adoption Intention. In Proceedings of the 2022 ACM SIGIR Conference on Human Information Interaction and Retrieval (CHIIR ’22), March 14–18, 2022, Regensburg, Germany. ACM, New York, NY, USA, 23 pages. https://doi.org/10.1145/3498366.3505756: - LERSSE-RefConfPaper-2022-001
(319)  Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones - Masoud Mehrabi Koushki et al - Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, and Konstantin Beznosov. Neither Access nor Control: A Longitudinal Investigation of The Efficacy of User Access Control Solutions on Smartphones. In Proceedings of the 31st USENIX Security Symposium, 2022.: - LERSSE-RefConfPaper-2022-004
(317)  SoK: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software - Azadeh Mokhberi et al - Azadeh Mokhberi, Konstantin Beznosov. SoK: Human, Organizational, and Technological Dimensions of Developers’ Challenges in Engineering Secure Software. Proceedings of the ACM European Symposium on Usable Security (ACM EuroUSEC'21), 2021: - LERSSE-RefConfPaper-2021-006
(313)  What Makes Security-Related Code Examples Different - Azadeh Mokhberi et al - Azadeh Mokhberi, Tiffany Quon, Konstantin Beznosov. What Makes Security-Related Code Examples Different. In The 7th Workshop on Security Information Workers at SOUPS workshops, 2021.: - LERSSE-RefConfPaper-2021-007


Download history: