Search Results
USENIX Security '21 - On the Usability of Authenticity Checks for Hardware Security Tokens
SOUPS 2019 - A Usability Study of Five Two-Factor Authentication Methods
USENIX Security '17 - "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
USENIX Security '20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior
USENIX Security '20 - PHMon: A Programmable Hardware Monitor and Its Security Use Cases
SOUPS 2020 - User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
USENIX Security '20 - Secure parallel computation on national scale volumes of data
Katharina Krombholz: Towards Understandable Privacy & Security Guarantees - The Human Factors Persp.
USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
SOUPS 2019 - Monday Lightning Talks
Full talk: The Million-Key Question – Investigating the Origins of RSA Public Keys