1![Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst](https://www.pdfsearch.io/img/3e995ce2ef091b1d3794580d24757e4c.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:56:35
|
---|
2![Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst](https://www.pdfsearch.io/img/582c19ebd19b49e1df0d1d8cfe687ddc.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:56:35
|
---|
3![Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst](https://www.pdfsearch.io/img/40cf11d0bde3eaf8945fdd3fcd9b66bd.jpg) | Add to Reading ListSource URL: obj.umiacs.umd.edu- Date: 2017-05-15 16:43:59
|
---|
4![Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller](https://www.pdfsearch.io/img/be3c0c12d62f5f8343396aa572958171.jpg) | Add to Reading ListSource URL: cups.cs.cmu.edu- Date: 2005-05-30 16:31:14
|
---|
5![Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller](https://www.pdfsearch.io/img/c136bb8e7d9cf68863c2c4cd85fa0ac3.jpg) | Add to Reading ListSource URL: cups.cs.cmu.edu- Date: 2005-06-21 09:58:18
|
---|
6![Secure Web Authentication with Mobile Phones Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial Intelligence Lab, 32 Vassar Street, Cambridge MA 02139 {minwu, simsong, rcm}@csail.mit.edu As compu Secure Web Authentication with Mobile Phones Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial Intelligence Lab, 32 Vassar Street, Cambridge MA 02139 {minwu, simsong, rcm}@csail.mit.edu As compu](https://www.pdfsearch.io/img/e8039b2b68b9b6544efe19ec27772f29.jpg) | Add to Reading ListSource URL: dimacs.rutgers.edu- Date: 2004-05-05 09:44:02
|
---|
7![Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child](https://www.pdfsearch.io/img/6ee08288f0397874df865dc0a45bd8e6.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2007-06-08 09:53:29
|
---|
8![Introduction to Computer Security and Privacy Simson L. Garfinkel, Ph.D. http://www.simson.net/ Introduction to Computer Security and Privacy Simson L. Garfinkel, Ph.D. http://www.simson.net/](https://www.pdfsearch.io/img/397e0759c26cdc70e59293e91f4ad2cf.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2005-06-21 11:48:48
|
---|
9![Ethnomethodology and Usable Security: The Value of Descriptive Research for Graduate Students Hervé Saint-Louis, PhD Student, Faculty of Information, University of Toronto Instrumental, cognitive and behavioural approac Ethnomethodology and Usable Security: The Value of Descriptive Research for Graduate Students Hervé Saint-Louis, PhD Student, Faculty of Information, University of Toronto Instrumental, cognitive and behavioural approac](https://www.pdfsearch.io/img/3cfd36d0dcf03dbe0234d619a5e53311.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2015-07-17 22:36:03
|
---|
10![Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child](https://www.pdfsearch.io/img/455b928fb8d12e54f4b6dee9318f5603.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2007-06-08 09:53:29
|
---|