Security and privacy considerations in digital death (DOI)
Michael E. Locasto, Michael Massimi, Peter J. DePasquale
Reducing normative conflicts in information security (DOI)
Wolter Pieters, Lizzie Coles-Kemp
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation (DOI)
Kemal Bicakci, Paul C. van Oorschot
Applying problem-structuring methods to problems in computer security (DOI)
Peter Gutmann
Towards a formal model of accountability (DOI)
Joan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright
Influencing mental models of security: a research agenda (DOI)
Rick Wash, Emilee Rader
The security cost of cheap user interaction (DOI)
Rainer Böhme, Jens Grossklags
Position paper: why are there so many vulnerabilities in web applications? (DOI)
Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve Chapin
Resilience is more than availability (DOI)
Matt Bishop, Marco Carvalho, Richard Ford, Liam M. Mayron
Sherlock holmes' evil twin: on the impact of global inference for online privacy (DOI)
Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver
Public security: simulations need to replace conventional wisdom (DOI)
Kay Hamacher, Stefan Katzenbeisser
Gaming security by obscurity (DOI)
Dusko Pavlovic