Search Results

1 - 10 of 21 items :

  • "Usable Security" x
Clear All

Conference on Human Factors in Computing Systems. ACM, 2006, pp. 591-600. [30] G. Norcie, J. Blythe, K. Caine, and L. J. Camp, “Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems,” in Workshop on Usable Security (USEC), 2014. [31] A. Whitten and J. D. Tygar, “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0,” in Proceedings of the 8th USENIX Security Symposium, 1999. [32] N. Diakopoulos, M. De Choudhury, and M. Naaman, “Finding and assessing social media information sources in the context of journalism,” in

. . [32] G. Norcie, K. Caine, and L. J. Camp. Eliminating stoppoints in the installation and use of anonymity systems: A usability evaluation of the Tor Browser Bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS) , 2012. [33] B. D. Payne and W. K. Edwards. A brief introduction to usable security. IEEE Internet Computing , 12(3):13–21, 2008. [34] M. Perry. Tor Browser Bundle 3.5 is released, Dec. 2013. . [35] M. Perry, E

REFERENCES Borys D., Donaldson A., Finch C. F., 2013. Understanding safety management system applicability in community sport , Safety Science, Volume 60. Kaviya S., Praditsathaporn S., Yuparin P. P., 2010. Sport safety improvement using security camera without audience privacy violation , Procedia - Social and Behavioral Sciences Volume 2, Issue 1. Lee J., Fereira M., 2012. A role of team and organizational identification in the success of cause-related sport marketing , Sport Management Review, Volume 16, Issue 2. Jędrzejas N., 2017. Security management of

References [1] Baruch Awerbuch and Christian Scheideler, Group spreading: A protocol for provably secure distributed name service, Automata, Languages and Programming, Springer, 2004, pp. 183-195. [2] Daniel J Bernstein, Dnscurve: Usable security for dns, http: //, 2009. [3] Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang, High-speed high-security signatures, Journal of Cryptographic Engineering 2 (2012), no. 2, 77-89. [4] BitInfoCharts, Crypto-currencies statistics,, 2016. [5] Blockchain

Measurement , 2016. [35] Samy Kamkar. Evercookie - virtually irrevocable persistent cookies., September 2010. . [36] T. Kohno, A. Broido, and K. Claffy. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing , 2(2):93–108, 2005. [37] Balachander Krishnamurthy, Delfina Malandrino, and Craig E. Wills. Measuring privacy loss and the impact of privacy protection in web browsing. In Proc. of the Workshop on Usable Security , 2007. [38] Balachander Krishnamurthy, Konstantin Naryshkin, and Craig Wills. Privacy

Cristofaro, E., & Sasse, M. A. (2015). »They brought in the horrible key ring thing!« Analysing the Usability of Two-Factor Authentication in UK Online Banking. To appear in NDSS Workshop on Usable Security (USEC 2015) . Retrieved from Lee, D., Moon, J., Kim, Y. J., &Yi, M. Y. (2015.) Antecedents and consequences of mobile phone usability: Linking simplicity and interactivity to satisfaction, trust, and brand loyalty. Information & Management , 52(3), 295–304, Lee, M. (2009). Factors affecting

Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. , 2(CSCW):102:1–102:31, November 2018. [30] Linda Lee, JoongHwa Lee, Serge Egelman, and David Wagner. Information Disclosure Concerns in The Age of Wearable Computing. In Proceedings of the NDSS Workshop on Usable Security , USEC ’16, 2016. [31] Sapna Maheshwari. Sharing Data for Deals? More Like Watching It Go With a Sigh. The New York Times , page B1, December 2018. [32] Nathan Malkin, Julia Bernd, Maritza Johnson, and Serge Egelman. “What Can’t Data Be Used For Payne, B. and Edwards,W. (2008). A brief introduction to usable security, IEEE Internet Computing 12(3): 13-21. Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2): 120-126. Rowstron, A., Kermarrec, A., Castro, M. and Druschel, P. (2001). SCRIBE: The design of a large-scale event notification infrastructure, Proceedings of the 3rd International COST264 Workshop on Networked Group Communication, NGC’01, London, UK, pp. 30-43. Sakarindr, P. and Ansari, N. (2010). Survey

:// . [5] B ernstein , D. J. Curve25519: New Diffie-Hellman speed records. In Public Key Cryptography - PKC 2006 (Berlin, Heidelberg, 2006). [6] B ernstein , D. J. DNSCurve: Usable security for DNS. , 2009. [7] B ortzmeyer , S. DNS query name minimisation to improve privacy. RFC 7816, March 2016. [8] C alder , M., F lavel , A., K atz -B assett , E., M ahajan , R., and P adhye , J. Analyzing the performance of an any-cast cdn. In Proceedings of the 2015 Internet Measurement Conference (Tokyo, Japan, 2015), IMC ’15. [9] C astillo -P

, 2006. [6] Daniel J. Bernstein. DNSCurve: Usable security for DNS. , 2009. [7] Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. High-speed high-security signatures. Journal of Cryptographic Engineering , 2(2):77–89, 2012. [8] Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In Eli Biham, editor, Advances in Cryptology — EUROCRYPT , number 2656 in Lecture Notes in Computer Science, pages 416–432. Springer, January 2003. [9] Dan Boneh, Ben Lynn