CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0 (Apple Message framework v750)
Sender:
"ACM SIGCHI General Interest Announcements (Mailing List)" <[log in to unmask]>
X-To:
Date:
Tue, 23 May 2006 21:14:45 -0400
Reply-To:
Lorrie Cranor <[log in to unmask]>
Subject:
Content-Transfer-Encoding:
7bit
Content-Type:
text/plain; charset=US-ASCII; delsp=yes; format=flowed
From:
Lorrie Cranor <[log in to unmask]>
Parts/Attachments:
text/plain (80 lines)
The Symposium On Usable Privacy and Security early registration  
deadline is June 2, 2006. Register online at http://cups.cs.cmu.edu/ 
soups/2006/register.html

The advance program is now available online at http://cups.cs.cmu.edu/ 
soups/2006/program.html

SOUPS will be held July 12-14 at Carnegie Mellon University in  
Pittsburgh, PA. The program includes a Security User Studies Workshop  
and poster session on July 12, and technical paper sessions on July  
13 and 14. The conference dinner will be held at the Carnegie Museum  
of Natural History.

The list of technical papers appear below. For the complete schedule,  
see the SOUPS web site.

Password Management, Mnemonics, and Mother's Maiden Names

PASSPET: CONVENIENT PASSWORD MANAGEMENT AND PHISHING PROTECTION
Ka-Ping Yee, Kragen Sitaker

PASSWORD MANAGEMENT STRATEGIES FOR ONLINE ACCOUNTS
Shirley Gaw, Edward W. Felten

A COMPARISON OF PERCEIVED AND REAL SHOULDER-SURFING RISKS BETWEEN
ALPHANUMERIC AND GRAPHICAL PASSWORDS
Furkan Tari, A. Ant Ozok, Stephen H. Holden

HUMAN SELECTION OF MNEMONIC PHRASE-BASED PASSWORDS
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor


Intelligible Access Control

ALIGNING USABILITY AND SECURITY-A USABILITY STUDY OF POLARIS
DeWitt, Alex J. Kuljis, Jasna

AN EMPIRICAL STUDY OF NATURAL LANGUAGE PARSING OF PRIVACY POLICY RULES
USING THE SPARCLE POLICY WORKBENCH
Carolyn Brodie, Clare-Marie Karat, and John Karat

INTENTIONAL ACCESS MANAGEMENT: MAKING ACCESS CONTROL USABLE FOR
END-USERS
Xiang Cao and Lee Iverson


Risk Transparency

PRIVACY AND SECURITY THREAT ANALYSIS OF THE FEDERAL EMPLOYEE PERSONAL
IDENTITY VERIFICATION (PIV) PROGRAM
Paul A. Karger

PROTECTING DOMESTIC POWERLINE COMMUNICATIONS
Richard Newman, Sherman Gavette, Larry Yonge, Ross Anderson

POWER STRIPS, PROPHYLACTICS, AND PRIVACY, OH MY!
Julia Gideon, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti

SEEING FURTHER: EXTENDING VISUALIZATION AS A BASIS FOR USABLE SECURITY
Jennifer Rode, Carolina Johansson, Paul DiGioia, Roberto Silva Filho,
Kari Nies, David Nguyen, Jie Ren, Paul Dourish, and David Redmiles


Catching Phish

DECISION STRATEGIES AND SUSCEPTIBILITY TO PHISHING
Julie S. Downs, Mandy Holbrook, Lorrie Faith Cranor

THE METHODOLOGY AND AN APPLICATION TO FIGHT AGAINST UNICODE ATTACKS
Anthony Y. Fu, Xiaotie Deng, Wenyin Liu, Greg Little

WEB WALLET: PREVENTING PHISHING ATTACKS BY REVEALING USER INTENTIONS
Min Wu, Robert C. Miller, Greg Little

    ---------------------------------------------------------------
                To unsubscribe, send an empty email to
     mailto:[log in to unmask]
    For further details of CHI lists see http://sigchi.org/listserv
    ---------------------------------------------------------------

ATOM RSS1 RSS2