暂无分享,去创建一个
Jeremy Clark | Elizabeth Stobert | Shayan Eskandari | David Barrera | Jeremy Clark | Shayan Eskandari | David Barrera | E. Stobert
[1] Cathleen Wharton,et al. The cognitive walkthrough method: a practitioner's guide , 1994 .
[2] Elaine Shi,et al. Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.
[3] Jakob Nielsen,et al. Finding usability problems through heuristic evaluation , 1992, CHI.
[4] Jeremy Clark,et al. Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.
[5] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[6] Rob Miller,et al. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.
[7] Frank Stajano,et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Simson L. Garfinkel,et al. How to make secure email easier to use , 2005, CHI.
[9] Kimberly Keeton,et al. Why traditional storage systems don't help us save stuff forever , 2005 .
[10] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[11] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[12] Cormac Herley,et al. Is Everything We Know about Password Stealing Wrong? , 2012, IEEE Security & Privacy.
[13] Robert Biddle,et al. Browser interfaces and extended validation SSL certificates: an empirical study , 2009, CCSW '09.
[14] Paul C. van Oorschot,et al. A Research Agenda Acknowledging the Persistence of Passwords , 2012, IEEE Security & Privacy.
[15] Ghassan O. Karame,et al. On the privacy provisions of Bloom filters in lightweight bitcoin clients , 2014, IACR Cryptol. ePrint Arch..
[16] Ronald L. Rivest,et al. Responses to NIST's proposal , 1992, CACM.
[17] Edward W. Felten,et al. Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.
[18] John M. Carroll,et al. Interface metaphors and user interface design , 1988 .
[19] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[20] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.