种子简介
种子名称:
USENIX SOUPS
文件类型:
视频
文件数目:
220个文件
文件大小:
1.91 GB
收录时间:
2024-4-10 13:34
已经下载:
3次
资源热度:
20
最近下载:
2024-11-6 00:55
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:661eb4b3e2c0a3bc5456e4ce3591087e677392d9&dn=USENIX SOUPS
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
USENIX SOUPS.torrent
USENIX SOUPS 2019/A Self-Report Measure of End-User Security Attitudes (SA-6).mp420.07MB
USENIX SOUPS 2019/A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.mp422.14MB
USENIX SOUPS 2019/A Usability Study of Five Two-Factor Authentication Methods.mp413.87MB
USENIX SOUPS 2019/An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.mp416.86MB
USENIX SOUPS 2019/Certified Phishing Taking a Look at Public Key Certificates of Phishing Websites.mp414.8MB
USENIX SOUPS 2019/Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous.mp429.22MB
USENIX SOUPS 2019/Cooperative Privacy and Security Learning from People with Visual Impairments.mp416.14MB
USENIX SOUPS 2019/Enhancing Privacy through an Interactive On-demand Incremental Information.mp424.9MB
USENIX SOUPS 2019/Evaluating Users’ Perceptions about a System’s Privacy Differentiating Social.mp419.47MB
USENIX SOUPS 2019/Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen.mp422.28MB
USENIX SOUPS 2019/From Usability to Secure Computing and Back Again.mp415.37MB
USENIX SOUPS 2019/I don't own the data - End User Perceptions of Smart Home Device Data.mp417.56MB
USENIX SOUPS 2019/I was told to buy a software or lose my computer. I ignored it - A study.mp416.2MB
USENIX SOUPS 2019/Investigative Journalism in the Digital Age Privacy, Security and the Media.mp465.6MB
USENIX SOUPS 2019/Keepers of the Machines Examining How System Administrators Manage Software Updates.mp418.63MB
USENIX SOUPS 2019/Monday Lightning Talks.mp426.58MB
USENIX SOUPS 2019/More than Smart Speakers Security and Privacy Perceptions of Smart Home Personal.mp418.06MB
USENIX SOUPS 2019/Of Two Minds about Two-Factor Understanding Everyday FIDO U2F Usability.mp421.69MB
USENIX SOUPS 2019/Personal Information Leakage by Abusing the GDPR Right of Access.mp419.87MB
USENIX SOUPS 2019/Privacy and Security Threat Models and Mitigation Strategies of Older Adults.mp419.88MB
USENIX SOUPS 2019/Replication No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert.mp416.87MB
USENIX SOUPS 2019/Something isnt secure, but Im not sure how that translates into a problem.mp425.03MB
USENIX SOUPS 2019/System Administrators Prefer Command Line Interfaces, don't They An Exploratory Study.mp420.68MB
USENIX SOUPS 2019/The Effect of Entertainment Media on Mental Models of Computer Security.mp419.47MB
USENIX SOUPS 2019/The Fog of Warnings How Non-essential Notifications Blur with Security Warnings.mp418.39MB
USENIX SOUPS 2019/There is nothing that I need to keep secret Sharing Practices and Concerns.mp418.36MB
USENIX SOUPS 2019/Tuesday Lightning Talks 1.mp423.36MB
USENIX SOUPS 2019/Tuesday Lightning Talks 2.mp418.24MB
USENIX SOUPS 2019/Usability Smells An Analysis of Developers’ Struggle With Crypto Libraries.mp421.85MB
USENIX SOUPS 2019/We Cant Live Without Them - App Developers Adoption of Ad Networks and Their.mp416.81MB
USENIX SOUPS 2019/Why people (don’t) use password managers effectively.mp419.51MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk).mp43.12MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Making GDPR Usable (Lightning Talk).mp46.05MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Overthrowing - Master - Passwords by Throwing Dice (Lightning Talk).mp47MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Security for Smart Cities (Lightning Talk).mp45.69MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/sers Are still Not the Enemy Applying Security Usability Principles(Lightning Talk).mp45.15MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Sustainable, Scalable and Secure IoT Architecture (Lightning Talk).mp43.16MB
USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Tr(b)usted Identity Proofing (Lightning Talk).mp43.15MB
USENIX SOUPS 2020/SOUPS 2020 Posters/A Cybersecurity Research Ethics Decision Support UI (Poster).mp41.82MB
USENIX SOUPS 2020/SOUPS 2020 Posters/A Multilingual Comparison of Email Scams (Poster).mp41.27MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Automatic Section Title Generation to Improve the Readability of Privacy (Poster).mp41.31MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Characterizing Digital Homelessness (Poster).mp41.26MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Cyber Attack A Story-driven Educational Hacking Game (Poster).mp41.45MB
USENIX SOUPS 2020/SOUPS 2020 Posters/DeFaking Deepfakes Understanding Journalists Needs for Deepfake Detection (Poster).mp41.62MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Effect of Priming on Smart Home Privacy Preferences (Poster).mp41.35MB
USENIX SOUPS 2020/SOUPS 2020 Posters/End Users Information-sharing Behaviours and Preferences within (Poster).mp41.43MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Get a Free Item Pack with Every Activation - Do Incentives Increase (Poster).mp4931.48KB
USENIX SOUPS 2020/SOUPS 2020 Posters/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises (Poster).mp41.39MB
USENIX SOUPS 2020/SOUPS 2020 Posters/I cannot do anything - Users Behavior and Protection Strategy upon Losing (Poster).mp41019.77KB
USENIX SOUPS 2020/SOUPS 2020 Posters/Interactive Stories for Security Education A Case Study on Password Managers (Poster).mp41.26MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Learning through Videos Uncovering Approaches to Educating People (Poster).mp41.67MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Mental Models of Domain Names and URLs (Poster).mp4985.17KB
USENIX SOUPS 2020/SOUPS 2020 Posters/mething Doesnt Feel Right Using Thermal Warnings to Improve User Security (Poster).mp41.48MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Mobile Security Behavior Observatory Long-term Monitoring of Mobile User (Poster).mp41.33MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Observation Study on Usability Challenges for Fingerprint Authentication (Poster).mp41.02MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Older Adults Perceptions of Intelligent Voice Assistant Privacy (Poster).mp41.27MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Privacy Not Found A Study of the Availability of Privacy Policies on the Web (Poster).mp41.16MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Privacy Preferences vs. Settings A Case Study of Android Permissions (Poster).mp41.1MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Question Answering for Privacy Policies Combining Computational and Legal (Poster).mp41.41MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Smart Home Updates User Perceptions and Experiences (Poster).mp41.36MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Towards a Conceptual Model for Provoking Privacy Speculation (Poster).mp41.7MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Towards Inclusive Design for Privacy and Security Perspectives from (Poster).mp41.17MB
USENIX SOUPS 2020/SOUPS 2020 Posters/UISA User Interface Security Assessment (Poster).mp42.06MB
USENIX SOUPS 2020/SOUPS 2020 Posters/What are PETs for Privacy Experts and Non-experts (Poster).mp41.09MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Why are Developers Struggling to Put GDPR into Practice when Developing (Poster).mp41.84MB
USENIX SOUPS 2020/SOUPS 2020 Posters/Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it (Poster).mp41.24MB
USENIX SOUPS 2020/SOUPS 2020 Talks/An Empirical Study of Wireless Carrier Authentication for SIM Swaps.mp44.08MB
USENIX SOUPS 2020/SOUPS 2020 Talks/An Ethnographic Understanding of Software (In)Security and a Co-Creation Model.mp49.9MB
USENIX SOUPS 2020/SOUPS 2020 Talks/An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Process.mp44.86MB
USENIX SOUPS 2020/SOUPS 2020 Talks/An investigation of phishing awareness and education over time When and how to best.mp45.45MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Blind and Human Exploring More Usable Audio CAPTCHA Designs.mp47.22MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Cloudy with a Chance of Misconceptions Exploring Users Perceptions and Expectations.mp43.03MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Do Privacy and Security Matter to Everyone Quantifying and Clustering User-Centric.mp43.59MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Enhancing Privacy through the Visual Design of Privacy Notices Exploring the Interplay.mp414.71MB
USENIX SOUPS 2020/SOUPS 2020 Talks/From Intent to Action Nudging Users Towards Secure Mobile Payments.mp410.65MB
USENIX SOUPS 2020/SOUPS 2020 Talks/How Risky Are Real Users IFTTT Applets.mp49.46MB
USENIX SOUPS 2020/SOUPS 2020 Talks/I Have a Narrow Thought Process - Constrain'ts on Explanations Connecting Inferences.mp45.58MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Industry Responses to the European Directive on Security of Network and Information.mp48.41MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Innovation Inaction or In Action The Role of User Experience in the Security.mp43.68MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Keynote Maybe We Have Been Doing This Wrong Protester as Persona.mp442.43MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Knock, Knock. Who’s There On the Security of LG’s Knock Codes.mp48.08MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian.mp44.65MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Passworld A Serious Game to Promote Password Awareness and Diversity in an Enterprise.mp412.82MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Realizing Choice Online Safeguards for Couples Adapting to Cognitive Challenges.mp43.64MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Replication On the Ecological Validity of Online Security Developer Studies.mp43.55MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Replication Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability.mp45.58MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Security, Availability, and Multiple Information Sources Exploring Update Behavior.mp44.8MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault.mp48.88MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Usable Sexurity Studying People’s Concerns and Strategies When Sexting.mp43.55MB
USENIX SOUPS 2020/SOUPS 2020 Talks/User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.mp49.21MB
USENIX SOUPS 2020/SOUPS 2020 Talks/Why Cant Johnny Fix Vulnerabilities A Usability Evaluation of Static Analysis Tools.mp44.54MB
USENIX SOUPS 2020/SOUPS 2020 Talks/You still use the password after all - Exploring FIDO2 Security Keys in a Small.mp43.2MB
USENIX SOUPS 2020/SOUPS 2020 Talks/You've Got Your Nice List of Bugs, Now What - Vulnerability Discovery and Management.mp410.61MB
USENIX SOUPS 2021/A Fait Accompli An Empirical Study into the Absence of Consent to Third-Party Tracking.mp43.31MB
USENIX SOUPS 2021/A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS.mp42.96MB
USENIX SOUPS 2021/An Analysis of the Role of Situated Learning in Starting a Security Culture in a.mp43.92MB
USENIX SOUPS 2021/Benefits and Drawbacks of Adopting a Secure Programming Language Rust as a Case Study.mp43.44MB
USENIX SOUPS 2021/Challenges and Threats of Mass Telecommuting A Qualitative Study of Workers.mp43.88MB
USENIX SOUPS 2021/Code Reviewing as Methodology for Online Security Studies with Developers - A Case.mp42.67MB
USENIX SOUPS 2021/Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and.mp43.36MB
USENIX SOUPS 2021/Concerned but Ineffective User Perceptions, Methods, and Challenges when Sanitizing.mp44.45MB
USENIX SOUPS 2021/Deciding on Personalized Ads Nudging Developers About User Privacy.mp44.7MB
USENIX SOUPS 2021/Decision-Making Errors in Mobile Phishing.mp41.97MB
USENIX SOUPS 2021/Designing Toxic Content Classification for a Diversity of Perspectives.mp43.28MB
USENIX SOUPS 2021/Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for.mp45.62MB
USENIX SOUPS 2021/Examining the Examiners Students' Privacy and Security Perceptions of Online.mp45.3MB
USENIX SOUPS 2021/Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.mp43.38MB
USENIX SOUPS 2021/Facial Recognition Understanding Privacy Concerns and Attitudes Across Increasingly.mp45.3MB
USENIX SOUPS 2021/Gallery of Latin American Malware.mp42.34MB
USENIX SOUPS 2021/How I Know For Sure - People's Perspectives on Solely Automated Decision-Making (SADM).mp44.16MB
USENIX SOUPS 2021/I have no idea what they're trying to accomplish - Enthusiastic and Casual Signal.mp45.01MB
USENIX SOUPS 2021/I'm Literally Just Hoping This Will Work'' Obstacles Blocking the Online Security.mp44.92MB
USENIX SOUPS 2021/Investigating Web Service Account Remediation Advice.mp44.29MB
USENIX SOUPS 2021/Keynote Address Mitigating Technology Abuse in Intimate Partner Violence.mp445.49MB
USENIX SOUPS 2021/Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.mp44.55MB
USENIX SOUPS 2021/Never ever or no matter what Investigating Adoption Intentions and Misconceptions.mp43.34MB
USENIX SOUPS 2021/On the Limited Impact of Visualizing Encryption Perceptions of E2E Messaging Security.mp45.2MB
USENIX SOUPS 2021/Please do not use or your License Plate Number Analyzing Password Policies in.mp43MB
USENIX SOUPS 2021/PowerCut and Obfuscator An Exploration of the Design Space for Privacy-Preserving.mp43.59MB
USENIX SOUPS 2021/Proposing the ‘Signature’ Auth Scheme More Usable AND Secure Than Status Quo.mp42.39MB
USENIX SOUPS 2021/Pursuing Usable and Useful Data Downloads Under GDPR CCPA Access Rights via Co-Design.mp43.13MB
USENIX SOUPS 2021/Replication Effects of Media on the Mental Models of Technical Users.mp43.95MB
USENIX SOUPS 2021/SoK Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing.mp44.88MB
USENIX SOUPS 2021/Solitude A privacy analysis tool.mp43.37MB
USENIX SOUPS 2021/The Thing Doesn't Have a Name - Learning from Emergent Real-World Interventions in.mp44.67MB
USENIX SOUPS 2021/Towards Usable and Secure Location-based Smartphone Authentication.mp45.38MB
USENIX SOUPS 2021/Trust by design a new old requirement.mp41.76MB
USENIX SOUPS 2021/Understanding Privacy Attitudes and Concerns Towards Remote Communications During the.mp43.85MB
USENIX SOUPS 2021/Understanding Users' Knowledge about the Privacy and Security of Browser Extensions.mp44.24MB
USENIX SOUPS 2021/User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming.mp43.52MB
USENIX SOUPS 2021/Using a Blocklist to Improve the Security of User Selection of Android Patterns.mp45.47MB
USENIX SOUPS 2021/Virtual Classrooms and Real Harms Remote Learning at U.S. Universities.mp49.9MB
USENIX SOUPS 2021/WebAlly Making Visual Task-based CAPTCHAs Transferable for People with Visual.mp43.7MB
USENIX SOUPS 2021/Whether it's moral is a whole other story - Consumer perspectives on privacy.mp43.01MB
USENIX SOUPS 2021/Why They Ignore English Emails The Challenges of Non-Native Speakers in Identifying.mp43.93MB
USENIX SOUPS 2022/An Empirical Study of a Decentralized Identity Wallet.mp48.91MB
USENIX SOUPS 2022/An open door may tempt a sain't Examining situational and individual determinants.mp49.56MB
USENIX SOUPS 2022/Anti-Privacy and Anti-Security Advice on TikTok Case Studies of Technology-Enabled.mp48.32MB
USENIX SOUPS 2022/As soon as it's a risk, I want to require MFA - How Administrators Configure.mp412.87MB
USENIX SOUPS 2022/Aunties, Strangers, and the FBI Online Privacy Concerns and Experiences of Muslim.mp411.06MB
USENIX SOUPS 2022/Balancing Power Dynamics in Smart Homes Nannies' Perspectives on How Cameras.mp49.41MB
USENIX SOUPS 2022/Being Hacked Understanding Victims' Experiences of IoT Hacking.mp48.59MB
USENIX SOUPS 2022/Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.mp46.97MB
USENIX SOUPS 2022/Detecting iPhone Security Compromise in Simulated Stalking Scenarios Strategies and.mp47.8MB
USENIX SOUPS 2022/Do Password Managers Nudge Secure (Random) Passwords.mp46.72MB
USENIX SOUPS 2022/DualCheck Exploiting Human Verification Tasks for Opportunistic Online Safety.mp47.43MB
USENIX SOUPS 2022/Evaluating the Usability of Privacy Choice Mechanisms.mp46.71MB
USENIX SOUPS 2022/Exploring User Authentication with Windows Hello in a Small Business Environment.mp48.1MB
USENIX SOUPS 2022/Exploring User-Suitable Metaphors for Differentially Private Data Analyses.mp49.73MB
USENIX SOUPS 2022/Fast, Easy, Convenient. Studying Adoption and Perception of Digital Covid Certificates.mp47.81MB
USENIX SOUPS 2022/I don’t know why I check this Investigating Expert Users' Strategies to Detect.mp411.42MB
USENIX SOUPS 2022/If You Can’t Get Them to the Lab Evaluating a Virtual Study Environment with.mp48.79MB
USENIX SOUPS 2022/Improving Password Generation Through the Design of a Password Composition Policy.mp47.16MB
USENIX SOUPS 2022/Increasing security without decreasing usability A comparison of various verifiable.mp47.03MB
USENIX SOUPS 2022/Industrial practitioners' mental models of adversarial machine learning.mp48.97MB
USENIX SOUPS 2022/Investigating How University Students in the United States Encounter and Deal With.mp414.04MB
USENIX SOUPS 2022/Is it a concern or a preference An investigation into the ability of privacy scales.mp49.13MB
USENIX SOUPS 2022/Let The Right One In Attestation as a Usable CAPTCHA Alternative.mp49.27MB
USENIX SOUPS 2022/Let’s Hash Helping Developers with Password Security.mp46.48MB
USENIX SOUPS 2022/Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review.mp43.59MB
USENIX SOUPS 2022/Lightning Talk - Informed Consent Are your participants aware of what they share.mp44.05MB
USENIX SOUPS 2022/Lightning Talk - IoT Inspector a platform for real-world smart home research.mp43.92MB
USENIX SOUPS 2022/Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab.mp48.96MB
USENIX SOUPS 2022/Lightning Talk - Skilled or Gullible Gender Stereotypes Related to Computer Security.mp44.19MB
USENIX SOUPS 2022/Normative and Non-Social Beliefs about Sensor Data Implications for Collective.mp410.68MB
USENIX SOUPS 2022/On recruiting and retaining users for security-sensitive longitudinal measurement.mp47.28MB
USENIX SOUPS 2022/Password policies of most top websites fail to follow best practices.mp47.32MB
USENIX SOUPS 2022/Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve.mp47.43MB
USENIX SOUPS 2022/Replication How Well Do My Results Generalize Now The External Validity of Online.mp48.58MB
USENIX SOUPS 2022/Replication Stories as Informal Lessons about Security.mp46.11MB
USENIX SOUPS 2022/Replication The Effect of Differential Privacy Communication on German Users'.mp46.18MB
USENIX SOUPS 2022/Runtime Permissions for Privacy in Proactive Intelligent Assistants.mp48.25MB
USENIX SOUPS 2022/Sharing without Scaring Enabling Smartphones to Become Aware of Temporary Sharing.mp48.87MB
USENIX SOUPS 2022/SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries.mp433.28MB
USENIX SOUPS 2022/The Nerd Factor The Potential of S&P Adepts to Serve as a Social Resource.mp46.02MB
USENIX SOUPS 2022/Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site.mp47.26MB
USENIX SOUPS 2022/Usability and Security of Trusted Platform Module (TPM) Library APIs.mp410.48MB
USENIX SOUPS 2022/Users' Perceptions of Chrome Compromised Credential Notification.mp45.87MB
USENIX SOUPS 2023/'Give Me Structure' Synthesis and Evaluation of a (Network) Threat Analysis Process.mp415.15MB
USENIX SOUPS 2023/Adventures in Recovery Land Testing the Account Recovery of Popular Websites.mp48.05MB
USENIX SOUPS 2023/An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers'.mp410.19MB
USENIX SOUPS 2023/Checking, nudging or scoring Evaluating e-mail user security tools.mp413.19MB
USENIX SOUPS 2023/Data Privacy and Pluralistic Ignorance.mp413.78MB
USENIX SOUPS 2023/Dissecting Nudges in Password Managers Simple Defaults are Powerful.mp47.47MB
USENIX SOUPS 2023/Distrust of big tech and a desire for privacy Understanding the motivations.mp48.25MB
USENIX SOUPS 2023/Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.mp411.98MB
USENIX SOUPS 2023/Evaluating User Behavior in Smartphone Security A Psychometric Perspective.mp410.42MB
USENIX SOUPS 2023/Evolution of Password Expiry in Companies Measuring the Adoption of Recommendations.mp47.83MB
USENIX SOUPS 2023/Exploring the Security Culture of Operational Technology (OT) Organisations.mp47.55MB
USENIX SOUPS 2023/Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective.mp412.07MB
USENIX SOUPS 2023/Fight Fire with Fire Hacktivists' Take on Social Media Misinformation.mp413.39MB
USENIX SOUPS 2023/GuardLens Supporting Safer Online Browsing for People with Visual Impairments.mp49.72MB
USENIX SOUPS 2023/ImageAlly A Human-AI Hybrid Approach to Support Blind People in Detecting.mp47.73MB
USENIX SOUPS 2023/Investigating Security Indicators for Hyperlinking Within the Metaverse.mp48.15MB
USENIX SOUPS 2023/Is Reporting Worth the Sacrifice of Revealing What I've Sent.mp48.43MB
USENIX SOUPS 2023/Iterative Design of An Accessible Crypto Wallet for Blind Users.mp410.77MB
USENIX SOUPS 2023/Lacking the Tools and Support to Fix Friction Results from an Interview Study.mp412.38MB
USENIX SOUPS 2023/Lightning Talk - De-identification in practice professionals as end users.mp43.85MB
USENIX SOUPS 2023/Lightning Talk - Decisions and Disruptions 2 Decide Harder.mp44.29MB
USENIX SOUPS 2023/Lightning Talk - Getting the Message Out Considering a Connected Products.mp48.59MB
USENIX SOUPS 2023/Lightning Talk - Lessons Learned in Communicating Differential Privacy to Data Subjects.mp44.32MB
USENIX SOUPS 2023/Lightning Talk - Look before you Link Privacy Risk Inspection of Open Data through.mp44.11MB
USENIX SOUPS 2023/Lightning Talk - Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality.mp45.77MB
USENIX SOUPS 2023/Lightning Talk - TAM is not SAM - Acceptance of Security Technology.mp43.92MB
USENIX SOUPS 2023/Lightning Talk - Towards a more effective system for training tier 1 SOC analysts.mp44.04MB
USENIX SOUPS 2023/Nobody's Happy - Design Insights from Privacy-Conscious Smart Home Power Users.mp411.37MB
USENIX SOUPS 2023/On the Recruitment of Company Developers for Security Studies.mp49.36MB
USENIX SOUPS 2023/Privacy Mental Models of Electronic Health Records A German Case Study.mp47.75MB
USENIX SOUPS 2023/Prospects for Improving Password Selection.mp48.29MB
USENIX SOUPS 2023/SoK I Have the (Developer) Power Sample Size Estimation for.mp48.1MB
USENIX SOUPS 2023/SOUPS 2023 Keynote Address - Weaponizing Technology Examining the Importance of Privacy.mp453.48MB
USENIX SOUPS 2023/Stalking is immoral but not illegal - Understanding Security, Cyber Crimes.mp412.84MB
USENIX SOUPS 2023/Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor.mp49.47MB
USENIX SOUPS 2023/There will be less privacy, of course - How and why people in 10 countries expect AI.mp412.99MB
USENIX SOUPS 2023/Towards Usable Security Analysis Tools for Trigger-Action Programming.mp49.29MB
USENIX SOUPS 2023/Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.mp48.54MB
USENIX SOUPS 2023/What can central bank digital currency designers learn from asking potential users.mp411.51MB
USENIX SOUPS 2023/Who Comes Up with this Stuff Interviewing Authors to Understand How They Produce.mp49.34MB
USENIX SOUPS 2023/Would You Give the Same Priority to the Bank and a Game I Do Not.mp49.49MB
USENIX SOUPS 2023/Youth understandings of online privacy and security A dyadic study of children.mp413.32MB