- From: Lorrie Cranor <lorrie+@cs.cmu.edu>
- Date: Fri, 9 Jun 2006 20:16:47 -0400
- To: public-usable-authentication@w3.org
The Symposium On Usable Privacy and Security (SOUPS) will be held July 12-14 at Carnegie Mellon University in Pittsburgh, PA. The program includes a Security User Studies Workshop and poster session on July 12, and technical paper sessions on July 13 and 14. The conference dinner will be held at the Carnegie Museum of Natural History. There are a number of papers and posters related to usable authentication. And we are planning a panel on combating phishing. For details see http://cups.cs.cmu.edu/soups/ The list of technical papers appears below. For the complete schedule, see the SOUPS web site (full papers will be posted there within the next few weeks). Password Management, Mnemonics, and Mother's Maiden Names PASSPET: CONVENIENT PASSWORD MANAGEMENT AND PHISHING PROTECTION Ka-Ping Yee, Kragen Sitaker PASSWORD MANAGEMENT STRATEGIES FOR ONLINE ACCOUNTS Shirley Gaw, Edward W. Felten A COMPARISON OF PERCEIVED AND REAL SHOULDER-SURFING RISKS BETWEEN ALPHANUMERIC AND GRAPHICAL PASSWORDS Furkan Tari, A. Ant Ozok, Stephen H. Holden HUMAN SELECTION OF MNEMONIC PHRASE-BASED PASSWORDS Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor Intelligible Access Control ALIGNING USABILITY AND SECURITY-A USABILITY STUDY OF POLARIS DeWitt, Alex J. Kuljis, Jasna AN EMPIRICAL STUDY OF NATURAL LANGUAGE PARSING OF PRIVACY POLICY RULES USING THE SPARCLE POLICY WORKBENCH Carolyn Brodie, Clare-Marie Karat, and John Karat INTENTIONAL ACCESS MANAGEMENT: MAKING ACCESS CONTROL USABLE FOR END-USERS Xiang Cao and Lee Iverson Risk Transparency PRIVACY AND SECURITY THREAT ANALYSIS OF THE FEDERAL EMPLOYEE PERSONAL IDENTITY VERIFICATION (PIV) PROGRAM Paul A. Karger PROTECTING DOMESTIC POWERLINE COMMUNICATIONS Richard Newman, Sherman Gavette, Larry Yonge, Ross Anderson POWER STRIPS, PROPHYLACTICS, AND PRIVACY, OH MY! Julia Gideon, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti SEEING FURTHER: EXTENDING VISUALIZATION AS A BASIS FOR USABLE SECURITY Jennifer Rode, Carolina Johansson, Paul DiGioia, Roberto Silva Filho, Kari Nies, David Nguyen, Jie Ren, Paul Dourish, and David Redmiles Catching Phish DECISION STRATEGIES AND SUSCEPTIBILITY TO PHISHING Julie S. Downs, Mandy Holbrook, Lorrie Faith Cranor THE METHODOLOGY AND AN APPLICATION TO FIGHT AGAINST UNICODE ATTACKS Anthony Y. Fu, Xiaotie Deng, Wenyin Liu, Greg Little WEB WALLET: PREVENTING PHISHING ATTACKS BY REVEALING USER INTENTIONS Min Wu, Robert C. Miller, Greg Little
Received on Saturday, 10 June 2006 00:17:00 UTC