USENIX SOUPS
视频
|
2025-5-20 02:56
|
2025-7-29 14:53
|
22
|
2.31 GB
|
294
|
- USENIX SOUPS 2019/A Self-Report Measure of End-User Security Attitudes (SA-6).mp418.47MB
- USENIX SOUPS 2019/A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.mp421.25MB
- USENIX SOUPS 2019/A Usability Study of Five Two-Factor Authentication Methods.mp415.68MB
- USENIX SOUPS 2019/An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.mp418.96MB
- USENIX SOUPS 2019/Certified Phishing Taking a Look at Public Key Certificates of Phishing Websites.mp413.78MB
- USENIX SOUPS 2019/Communicating Device Confidence Level and Upcoming Re-Authentications in Continuous.mp424.2MB
- USENIX SOUPS 2019/Cooperative Privacy and Security Learning from People with Visual Impairments.mp415.34MB
- USENIX SOUPS 2019/Enhancing Privacy through an Interactive On-demand Incremental Information.mp421.7MB
- USENIX SOUPS 2019/Evaluating Users’ Perceptions about a System’s Privacy Differentiating Social.mp418.34MB
- USENIX SOUPS 2019/Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen.mp419.33MB
- USENIX SOUPS 2019/From Usability to Secure Computing and Back Again.mp415.1MB
- USENIX SOUPS 2019/I don't own the data - End User Perceptions of Smart Home Device Data.mp415.96MB
- USENIX SOUPS 2019/I was told to buy a software or lose my computer. I ignored it - A study.mp416MB
- USENIX SOUPS 2019/Investigative Journalism in the Digital Age Privacy, Security and the Media.mp459.1MB
- USENIX SOUPS 2019/Keepers of the Machines Examining How System Administrators Manage Software Updates.mp417.7MB
- USENIX SOUPS 2019/Monday Lightning Talks.mp442.61MB
- USENIX SOUPS 2019/More than Smart Speakers Security and Privacy Perceptions of Smart Home Personal.mp416.53MB
- USENIX SOUPS 2019/Of Two Minds about Two-Factor Understanding Everyday FIDO U2F Usability.mp420.89MB
- USENIX SOUPS 2019/Personal Information Leakage by Abusing the GDPR Right of Access.mp418.48MB
- USENIX SOUPS 2019/Privacy and Security Threat Models and Mitigation Strategies of Older Adults.mp418.61MB
- USENIX SOUPS 2019/Replication No One Can Hack My Mind Revisiting a Study on Expert and Non-Expert.mp414.39MB
- USENIX SOUPS 2019/Something isnt secure, but Im not sure how that translates into a problem.mp423.69MB
- USENIX SOUPS 2019/System Administrators Prefer Command Line Interfaces, don't They An Exploratory Study.mp419.36MB
- USENIX SOUPS 2019/The Effect of Entertainment Media on Mental Models of Computer Security.mp420.02MB
- USENIX SOUPS 2019/The Fog of Warnings How Non-essential Notifications Blur with Security Warnings.mp418.74MB
- USENIX SOUPS 2019/There is nothing that I need to keep secret Sharing Practices and Concerns.mp416.33MB
- USENIX SOUPS 2019/Tuesday Lightning Talks 1.mp422.72MB
- USENIX SOUPS 2019/Tuesday Lightning Talks 2.mp419.06MB
- USENIX SOUPS 2019/Usability Smells An Analysis of Developers’ Struggle With Crypto Libraries.mp420.02MB
- USENIX SOUPS 2019/We Cant Live Without Them - App Developers Adoption of Ad Networks and Their.mp416.69MB
- USENIX SOUPS 2019/Why people (don’t) use password managers effectively.mp418.64MB
- USENIX SOUPS 2019/USENIX SOUPS 2019 captions/A Self-Report Measure of End-User Security Attitudes (SA-6).eng.tsv21.12KB
- USENIX SOUPS 2019/USENIX SOUPS 2019 captions/A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.eng.tsv22.97KB
- USENIX SOUPS 2019/USENIX SOUPS 2019 captions/Exploring Intentional Behaviour Modifications for Password Typing on Mobile Touchscreen.eng.tsv22.29KB
- USENIX SOUPS 2019/USENIX SOUPS 2019 captions/Investigative Journalism in the Digital Age Privacy, Security and the Media.eng.tsv58.11KB
- USENIX SOUPS 2019/USENIX SOUPS 2019 captions/Tuesday Lightning Talks 2.eng.tsv19.39KB
- USENIX SOUPS 2020/An Empirical Study of Wireless Carrier Authentication for SIM Swaps.mp44.24MB
- USENIX SOUPS 2020/An Ethnographic Understanding of Software (In)Security and a Co-Creation Model.mp49.43MB
- USENIX SOUPS 2020/An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Process.mp45.06MB
- USENIX SOUPS 2020/An investigation of phishing awareness and education over time When and how to best.mp45.37MB
- USENIX SOUPS 2020/Blind and Human Exploring More Usable Audio CAPTCHA Designs.mp46.9MB
- USENIX SOUPS 2020/Cloudy with a Chance of Misconceptions Exploring Users Perceptions and Expectations.mp42.81MB
- USENIX SOUPS 2020/Do Privacy and Security Matter to Everyone Quantifying and Clustering User-Centric.mp43.64MB
- USENIX SOUPS 2020/Enhancing Privacy through the Visual Design of Privacy Notices Exploring the Interplay.mp414.44MB
- USENIX SOUPS 2020/From Intent to Action Nudging Users Towards Secure Mobile Payments.mp410.62MB
- USENIX SOUPS 2020/How Risky Are Real Users IFTTT Applets.mp48.41MB
- USENIX SOUPS 2020/I Have a Narrow Thought Process - Constrain'ts on Explanations Connecting Inferences.mp45.42MB
- USENIX SOUPS 2020/Industry Responses to the European Directive on Security of Network and Information.mp48.91MB
- USENIX SOUPS 2020/Innovation Inaction or In Action The Role of User Experience in the Security.mp43.55MB
- USENIX SOUPS 2020/Keynote Maybe We Have Been Doing This Wrong Protester as Persona.mp449.59MB
- USENIX SOUPS 2020/Knock, Knock. Who’s There On the Security of LG’s Knock Codes.mp47.05MB
- USENIX SOUPS 2020/Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian.mp44.5MB
- USENIX SOUPS 2020/Passworld A Serious Game to Promote Password Awareness and Diversity in an Enterprise.mp417.12MB
- USENIX SOUPS 2020/Realizing Choice Online Safeguards for Couples Adapting to Cognitive Challenges.mp43.32MB
- USENIX SOUPS 2020/Replication On the Ecological Validity of Online Security Developer Studies.mp43.72MB
- USENIX SOUPS 2020/Replication Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability.mp45.1MB
- USENIX SOUPS 2020/Security, Availability, and Multiple Information Sources Exploring Update Behavior.mp45.15MB
- USENIX SOUPS 2020/Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault.mp49.23MB
- USENIX SOUPS 2020/Usable Sexurity Studying People’s Concerns and Strategies When Sexting.mp43.77MB
- USENIX SOUPS 2020/User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.mp48.33MB
- USENIX SOUPS 2020/Why Cant Johnny Fix Vulnerabilities A Usability Evaluation of Static Analysis Tools.mp44.78MB
- USENIX SOUPS 2020/You still use the password after all - Exploring FIDO2 Security Keys in a Small.mp43.22MB
- USENIX SOUPS 2020/You've Got Your Nice List of Bugs, Now What - Vulnerability Discovery and Management.mp49.25MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk).mp43.12MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Making GDPR Usable (Lightning Talk).mp46.05MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Overthrowing - Master - Passwords by Throwing Dice (Lightning Talk).mp47MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Security for Smart Cities (Lightning Talk).mp45.69MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/sers Are still Not the Enemy Applying Security Usability Principles(Lightning Talk).mp45.15MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Sustainable, Scalable and Secure IoT Architecture (Lightning Talk).mp43.16MB
- USENIX SOUPS 2020/SOUPS 2020 Lightning Talks/Tr(b)usted Identity Proofing (Lightning Talk).mp43.15MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/A Cybersecurity Research Ethics Decision Support UI (Poster).mp41.82MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/A Multilingual Comparison of Email Scams (Poster).mp41.27MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Automatic Section Title Generation to Improve the Readability of Privacy (Poster).mp41.31MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Characterizing Digital Homelessness (Poster).mp41.26MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Cyber Attack A Story-driven Educational Hacking Game (Poster).mp41.45MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/DeFaking Deepfakes Understanding Journalists Needs for Deepfake Detection (Poster).mp41.62MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Effect of Priming on Smart Home Privacy Preferences (Poster).mp41.35MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/End Users Information-sharing Behaviours and Preferences within (Poster).mp41.43MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Get a Free Item Pack with Every Activation - Do Incentives Increase (Poster).mp4931.48KB
- USENIX SOUPS 2020/SOUPS 2020 Posters/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises (Poster).mp41.39MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/I cannot do anything - Users Behavior and Protection Strategy upon Losing (Poster).mp41019.77KB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Interactive Stories for Security Education A Case Study on Password Managers (Poster).mp41.26MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Learning through Videos Uncovering Approaches to Educating People (Poster).mp41.67MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Mental Models of Domain Names and URLs (Poster).mp4985.17KB
- USENIX SOUPS 2020/SOUPS 2020 Posters/mething Doesnt Feel Right Using Thermal Warnings to Improve User Security (Poster).mp41.48MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Mobile Security Behavior Observatory Long-term Monitoring of Mobile User (Poster).mp41.33MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Observation Study on Usability Challenges for Fingerprint Authentication (Poster).mp41.02MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Older Adults Perceptions of Intelligent Voice Assistant Privacy (Poster).mp41.27MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Privacy Not Found A Study of the Availability of Privacy Policies on the Web (Poster).mp41.16MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Privacy Preferences vs. Settings A Case Study of Android Permissions (Poster).mp41.1MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Question Answering for Privacy Policies Combining Computational and Legal (Poster).mp41.41MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Smart Home Updates User Perceptions and Experiences (Poster).mp41.36MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Towards a Conceptual Model for Provoking Privacy Speculation (Poster).mp41.7MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Towards Inclusive Design for Privacy and Security Perspectives from (Poster).mp41.17MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/UISA User Interface Security Assessment (Poster).mp42.06MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/What are PETs for Privacy Experts and Non-experts (Poster).mp41.09MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Why are Developers Struggling to Put GDPR into Practice when Developing (Poster).mp41.84MB
- USENIX SOUPS 2020/SOUPS 2020 Posters/Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it (Poster).mp41.24MB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/An Exploratory Study of Hardware Reverse Engineering - Technical and Cognitive Process.eng.tsv5.09KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Blind and Human Exploring More Usable Audio CAPTCHA Designs.eng.tsv10.32KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Cloudy with a Chance of Misconceptions Exploring Users Perceptions and Expectations.eng.tsv5.07KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Enhancing Privacy through the Visual Design of Privacy Notices Exploring the Interplay.eng.tsv14.44KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/How Risky Are Real Users IFTTT Applets.eng.tsv17.03KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/I Have a Narrow Thought Process - Constrain'ts on Explanations Connecting Inferences.eng.tsv6.01KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian.eng.tsv5.24KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Passworld A Serious Game to Promote Password Awareness and Diversity in an Enterprise.eng.tsv9.68KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Realizing Choice Online Safeguards for Couples Adapting to Cognitive Challenges.eng.tsv5.29KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Replication Why We Still Cant Browse in Peace On the Uniqueness and Reidentifiability.eng.tsv6.4KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Security, Availability, and Multiple Information Sources Exploring Update Behavior.eng.tsv5.47KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach.eng.tsv12.96KB
- USENIX SOUPS 2020/USENIX SOUPS 2019 captions/Why Cant Johnny Fix Vulnerabilities A Usability Evaluation of Static Analysis Tools.eng.tsv5.08KB
- USENIX SOUPS 2021/A Fait Accompli An Empirical Study into the Absence of Consent to Third-Party Tracking.mp44.14MB
- USENIX SOUPS 2021/A Qualitative Usability Evaluation of the Clang Static Analyzer and libFuzzer with CS.mp43.7MB
- USENIX SOUPS 2021/An Analysis of the Role of Situated Learning in Starting a Security Culture in a.mp44.92MB
- USENIX SOUPS 2021/Benefits and Drawbacks of Adopting a Secure Programming Language Rust as a Case Study.mp44.2MB
- USENIX SOUPS 2021/Challenges and Threats of Mass Telecommuting A Qualitative Study of Workers.mp45.26MB
- USENIX SOUPS 2021/Code Reviewing as Methodology for Online Security Studies with Developers - A Case.mp43.03MB
- USENIX SOUPS 2021/Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and.mp43.68MB
- USENIX SOUPS 2021/Concerned but Ineffective User Perceptions, Methods, and Challenges when Sanitizing.mp44.53MB
- USENIX SOUPS 2021/Deciding on Personalized Ads Nudging Developers About User Privacy.mp44.73MB
- USENIX SOUPS 2021/Decision-Making Errors in Mobile Phishing.mp42.11MB
- USENIX SOUPS 2021/Designing Toxic Content Classification for a Diversity of Perspectives.mp43.5MB
- USENIX SOUPS 2021/Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for.mp45.76MB
- USENIX SOUPS 2021/Examining the Examiners Students' Privacy and Security Perceptions of Online.mp45.13MB
- USENIX SOUPS 2021/Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.mp43.54MB
- USENIX SOUPS 2021/Facial Recognition Understanding Privacy Concerns and Attitudes Across Increasingly.mp45.47MB
- USENIX SOUPS 2021/Gallery of Latin American Malware.mp42.97MB
- USENIX SOUPS 2021/How I Know For Sure - People's Perspectives on Solely Automated Decision-Making (SADM).mp44.9MB
- USENIX SOUPS 2021/I have no idea what they're trying to accomplish - Enthusiastic and Casual Signal.mp45.81MB
- USENIX SOUPS 2021/I'm Literally Just Hoping This Will Work'' Obstacles Blocking the Online Security.mp44.99MB
- USENIX SOUPS 2021/Investigating Web Service Account Remediation Advice.mp44.8MB
- USENIX SOUPS 2021/Keynote Address Mitigating Technology Abuse in Intimate Partner Violence.mp431.25MB
- USENIX SOUPS 2021/Knowledge and Capabilities that Non-Expert Users Bring to Phishing Detection.mp45.01MB
- USENIX SOUPS 2021/Never ever or no matter what Investigating Adoption Intentions and Misconceptions.mp44.2MB
- USENIX SOUPS 2021/On the Limited Impact of Visualizing Encryption Perceptions of E2E Messaging Security.mp45.24MB
- USENIX SOUPS 2021/Please do not use - or your License Plate Number Analyzing Password Policies in.mp43.22MB
- USENIX SOUPS 2021/PowerCut and Obfuscator An Exploration of the Design Space for Privacy-Preserving.mp44.07MB
- USENIX SOUPS 2021/Proposing the ‘Signature’ Auth Scheme More Usable AND Secure Than Status Quo.mp42.45MB
- USENIX SOUPS 2021/Pursuing Usable and Useful Data Downloads Under GDPR CCPA Access Rights via Co-Design.mp43.51MB
- USENIX SOUPS 2021/Replication Effects of Media on the Mental Models of Technical Users.mp44.67MB
- USENIX SOUPS 2021/SoK Still Plenty of Phish in the Sea - A Taxonomy of User-Oriented Phishing.mp44.93MB
- USENIX SOUPS 2021/Solitude A privacy analysis tool.mp43.05MB
- USENIX SOUPS 2021/The Thing Doesn't Have a Name - Learning from Emergent Real-World Interventions in.mp45.11MB
- USENIX SOUPS 2021/Towards Usable and Secure Location-based Smartphone Authentication.mp44.81MB
- USENIX SOUPS 2021/Trust by design a new old requirement.mp41.92MB
- USENIX SOUPS 2021/Understanding Privacy Attitudes and Concerns Towards Remote Communications During the.mp44.06MB
- USENIX SOUPS 2021/Understanding Users' Knowledge about the Privacy and Security of Browser Extensions.mp44MB
- USENIX SOUPS 2021/User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming.mp44.22MB
- USENIX SOUPS 2021/Using a Blocklist to Improve the Security of User Selection of Android Patterns.mp45.31MB
- USENIX SOUPS 2021/Virtual Classrooms and Real Harms Remote Learning at U.S. Universities.mp415.55MB
- USENIX SOUPS 2021/WebAlly Making Visual Task-based CAPTCHAs Transferable for People with Visual.mp44.45MB
- USENIX SOUPS 2021/Whether it's moral is a whole other story - Consumer perspectives on privacy.mp43.62MB
- USENIX SOUPS 2021/Why They Ignore English Emails The Challenges of Non-Native Speakers in Identifying.mp44.12MB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Deciding on Personalized Ads Nudging Developers About User Privacy.eng.tsv4.76KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Decision-Making Errors in Mobile Phishing.eng.tsv2.22KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for.eng.tsv5.34KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Examining the Examiners Students' Privacy and Security Perceptions of Online.eng.tsv5.55KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants.eng.tsv5.01KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Gallery of Latin American Malware.eng.tsv2.21KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Investigating Web Service Account Remediation Advice.eng.tsv5.95KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Proposing the ‘Signature’ Auth Scheme More Usable AND Secure Than Status Quo.eng.tsv2.82KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Towards Usable and Secure Location-based Smartphone Authentication.eng.tsv3.75KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Understanding Users' Knowledge about the Privacy and Security of Browser Extensions.eng.tsv6.13KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Using a Blocklist to Improve the Security of User Selection of Android Patterns.eng.tsv5.34KB
- USENIX SOUPS 2021/USENIX SOUPS 2021 captions/Virtual Classrooms and Real Harms Remote Learning at U.S. Universities.eng.tsv4.59KB
- USENIX SOUPS 2022/An Empirical Study of a Decentralized Identity Wallet.mp48.28MB
- USENIX SOUPS 2022/An open door may tempt a sain't Examining situational and individual determinants.mp49.84MB
- USENIX SOUPS 2022/Anti-Privacy and Anti-Security Advice on TikTok Case Studies of Technology-Enabled.mp48.02MB
- USENIX SOUPS 2022/As soon as it's a risk, I want to require MFA - How Administrators Configure.mp413.57MB
- USENIX SOUPS 2022/Aunties, Strangers, and the FBI Online Privacy Concerns and Experiences of Muslim.mp411.52MB
- USENIX SOUPS 2022/Balancing Power Dynamics in Smart Homes Nannies' Perspectives on How Cameras.mp49.62MB
- USENIX SOUPS 2022/Being Hacked Understanding Victims' Experiences of IoT Hacking.mp49.3MB
- USENIX SOUPS 2022/Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality.mp46.82MB
- USENIX SOUPS 2022/Detecting iPhone Security Compromise in Simulated Stalking Scenarios Strategies and.mp47.6MB
- USENIX SOUPS 2022/Do Password Managers Nudge Secure (Random) Passwords.mp46.97MB
- USENIX SOUPS 2022/DualCheck Exploiting Human Verification Tasks for Opportunistic Online Safety.mp47.71MB
- USENIX SOUPS 2022/Evaluating the Usability of Privacy Choice Mechanisms.mp46.6MB
- USENIX SOUPS 2022/Exploring User Authentication with Windows Hello in a Small Business Environment.mp48.18MB
- USENIX SOUPS 2022/Exploring User-Suitable Metaphors for Differentially Private Data Analyses.mp49.86MB
- USENIX SOUPS 2022/Fast, Easy, Convenient. Studying Adoption and Perception of Digital Covid Certificates.mp48.18MB
- USENIX SOUPS 2022/I don’t know why I check this Investigating Expert Users' Strategies to Detect.mp412.55MB
- USENIX SOUPS 2022/If You Can’t Get Them to the Lab Evaluating a Virtual Study Environment with.mp48.97MB
- USENIX SOUPS 2022/Improving Password Generation Through the Design of a Password Composition Policy.mp47.34MB
- USENIX SOUPS 2022/Increasing security without decreasing usability A comparison of various verifiable.mp47.04MB
- USENIX SOUPS 2022/Industrial practitioners' mental models of adversarial machine learning.mp49.91MB
- USENIX SOUPS 2022/Investigating How University Students in the United States Encounter and Deal With.mp413.53MB
- USENIX SOUPS 2022/Is it a concern or a preference An investigation into the ability of privacy scales.mp48.88MB
- USENIX SOUPS 2022/Let The Right One In Attestation as a Usable CAPTCHA Alternative.mp48.64MB
- USENIX SOUPS 2022/Let’s Hash Helping Developers with Password Security.mp46.98MB
- USENIX SOUPS 2022/Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review.mp43.74MB
- USENIX SOUPS 2022/Lightning Talk - Informed Consent Are your participants aware of what they share.mp44.12MB
- USENIX SOUPS 2022/Lightning Talk - IoT Inspector a platform for real-world smart home research.mp44.53MB
- USENIX SOUPS 2022/Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab.mp412.93MB
- USENIX SOUPS 2022/Lightning Talk - Skilled or Gullible Gender Stereotypes Related to Computer Security.mp44.34MB
- USENIX SOUPS 2022/Normative and Non-Social Beliefs about Sensor Data Implications for Collective.mp410.67MB
- USENIX SOUPS 2022/On recruiting and retaining users for security-sensitive longitudinal measurement.mp46.85MB
- USENIX SOUPS 2022/Password policies of most top websites fail to follow best practices.mp46.87MB
- USENIX SOUPS 2022/Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve.mp46.81MB
- USENIX SOUPS 2022/Replication How Well Do My Results Generalize Now The External Validity of Online.mp48.91MB
- USENIX SOUPS 2022/Replication Stories as Informal Lessons about Security.mp46.65MB
- USENIX SOUPS 2022/Replication The Effect of Differential Privacy Communication on German Users'.mp46.76MB
- USENIX SOUPS 2022/Runtime Permissions for Privacy in Proactive Intelligent Assistants.mp48.36MB
- USENIX SOUPS 2022/Sharing without Scaring Enabling Smartphones to Become Aware of Temporary Sharing.mp48.38MB
- USENIX SOUPS 2022/SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries.mp436.64MB
- USENIX SOUPS 2022/The Nerd Factor The Potential of S&P Adepts to Serve as a Social Resource.mp45.85MB
- USENIX SOUPS 2022/Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site.mp46.69MB
- USENIX SOUPS 2022/Usability and Security of Trusted Platform Module (TPM) Library APIs.mp410.44MB
- USENIX SOUPS 2022/Users' Perceptions of Chrome Compromised Credential Notification.mp46.12MB
- USENIX SOUPS 2023/Adventures in Recovery Land Testing the Account Recovery of Popular Websites.mp47.56MB
- USENIX SOUPS 2023/An Investigation of Teenager Experiences in Social Virtual Reality from Teenagers'.mp49.11MB
- USENIX SOUPS 2023/Checking, nudging or scoring Evaluating e-mail user security tools.mp411.79MB
- USENIX SOUPS 2023/Data Privacy and Pluralistic Ignorance.mp412.19MB
- USENIX SOUPS 2023/Dissecting Nudges in Password Managers Simple Defaults are Powerful.mp47.07MB
- USENIX SOUPS 2023/Distrust of big tech and a desire for privacy Understanding the motivations.mp47.79MB
- USENIX SOUPS 2023/Evaluating the Impact of Community Oversight for Managing Mobile Privacy and Security.mp410.19MB
- USENIX SOUPS 2023/Evaluating User Behavior in Smartphone Security A Psychometric Perspective.mp49.11MB
- USENIX SOUPS 2023/Evolution of Password Expiry in Companies Measuring the Adoption of Recommendations.mp47.2MB
- USENIX SOUPS 2023/Exploring the Security Culture of Operational Technology (OT) Organisations.mp47.11MB
- USENIX SOUPS 2023/Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective.mp410.38MB
- USENIX SOUPS 2023/Fight Fire with Fire Hacktivists' Take on Social Media Misinformation.mp412.5MB
- USENIX SOUPS 2023/'Give Me Structure' Synthesis and Evaluation of a (Network) Threat Analysis Process.mp413.8MB
- USENIX SOUPS 2023/GuardLens Supporting Safer Online Browsing for People with Visual Impairments.mp48.85MB
- USENIX SOUPS 2023/ImageAlly A Human-AI Hybrid Approach to Support Blind People in Detecting.mp47.14MB
- USENIX SOUPS 2023/Investigating Security Indicators for Hyperlinking Within the Metaverse.mp47.29MB
- USENIX SOUPS 2023/Is Reporting Worth the Sacrifice of Revealing What I've Sent.mp48.5MB
- USENIX SOUPS 2023/Iterative Design of An Accessible Crypto Wallet for Blind Users.mp49.95MB
- USENIX SOUPS 2023/Lacking the Tools and Support to Fix Friction Results from an Interview Study.mp411.84MB
- USENIX SOUPS 2023/Lightning Talk - Decisions and Disruptions 2 Decide Harder.mp44.31MB
- USENIX SOUPS 2023/Lightning Talk - De-identification in practice professionals as end users.mp43.89MB
- USENIX SOUPS 2023/Lightning Talk - Getting the Message Out Considering a Connected Products.mp48.04MB
- USENIX SOUPS 2023/Lightning Talk - Lessons Learned in Communicating Differential Privacy to Data Subjects.mp44.33MB
- USENIX SOUPS 2023/Lightning Talk - Look before you Link Privacy Risk Inspection of Open Data through.mp43.85MB
- USENIX SOUPS 2023/Lightning Talk - Optimizing Shoulder-Surfing Resistance in Augmented and Virtual Reality.mp45.29MB
- USENIX SOUPS 2023/Lightning Talk - TAM is not SAM - Acceptance of Security Technology.mp44.12MB
- USENIX SOUPS 2023/Lightning Talk - Towards a more effective system for training tier 1 SOC analysts.mp44.39MB
- USENIX SOUPS 2023/Nobody's Happy - Design Insights from Privacy-Conscious Smart Home Power Users.mp410.36MB
- USENIX SOUPS 2023/On the Recruitment of Company Developers for Security Studies.mp48.8MB
- USENIX SOUPS 2023/Privacy Mental Models of Electronic Health Records A German Case Study.mp47.13MB
- USENIX SOUPS 2023/Prospects for Improving Password Selection.mp47.93MB
- USENIX SOUPS 2023/SoK I Have the (Developer) Power Sample Size Estimation for.mp48.01MB
- USENIX SOUPS 2023/SOUPS 2023 Keynote Address - Weaponizing Technology Examining the Importance of Privacy.mp448.77MB
- USENIX SOUPS 2023/Stalking is immoral but not illegal - Understanding Security, Cyber Crimes.mp411.91MB
- USENIX SOUPS 2023/Tangible 2FA - An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor.mp49.86MB
- USENIX SOUPS 2023/There will be less privacy, of course - How and why people in 10 countries expect AI.mp412.21MB
- USENIX SOUPS 2023/Towards Usable Security Analysis Tools for Trigger-Action Programming.mp49.3MB
- USENIX SOUPS 2023/Understanding the Viability of Gmail's Origin Indicator for Identifying the Sender.mp48.12MB
- USENIX SOUPS 2023/What can central bank digital currency designers learn from asking potential users.mp410.61MB
- USENIX SOUPS 2023/Who Comes Up with this Stuff Interviewing Authors to Understand How They Produce.mp48.77MB
- USENIX SOUPS 2023/Would You Give the Same Priority to the Bank and a Game I Do Not.mp48.96MB
- USENIX SOUPS 2023/Youth understandings of online privacy and security A dyadic study of children.mp412.38MB
- USENIX SOUPS 2024/A Survey of Cybersecurity Professionals’ Perceptions and Experiences of Safety and.mp410.41MB
- USENIX SOUPS 2024/Authentication UX Design Opportunities for Future Smart Glasses.mp43.99MB
- USENIX SOUPS 2024/Batman Hacked My Password A Subtitle-Based Analysis of Password Depiction in Movies.mp411.72MB
- USENIX SOUPS 2024/Best Practices for Engaging Industry Researchers.mp45.78MB
- USENIX SOUPS 2024/Beyond Fear and Frustration - Towards a Holistic Understanding of Emotions in.mp414.19MB
- USENIX SOUPS 2024/Beyond the Office Walls Understanding Security and Shadow Security Behaviours in a.mp46.99MB
- USENIX SOUPS 2024/Beyond the West Exploring the Impact and Regulation of Non-Consensual Image-Disclosure.mp45.72MB
- USENIX SOUPS 2024/Can Johnny be a whistleblower A qualitative user study of a social authentication.mp48.35MB
- USENIX SOUPS 2024/Comparing Malware Evasion Theory with Practice Results from Interviews with Expert.mp410.54MB
- USENIX SOUPS 2024/Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy.mp412.33MB
- USENIX SOUPS 2024/'Custodian of Online Communities' How Moderator Mutual Support in Communities Help.mp48.83MB
- USENIX SOUPS 2024/Cybersecurity Analysts' Perception of AI Security Tools and Practical Implications.mp46.34MB
- USENIX SOUPS 2024/Designing the Informing Process with Streamers and Bystanders in Live Streaming.mp47.65MB
- USENIX SOUPS 2024/Digital Nudges for Access Reviews Guiding Deciders to Revoke Excessive Authorizations.mp49.41MB
- USENIX SOUPS 2024/Evaluating Privacy Perceptions, Experience, and Behavior of Software Development Teams.mp49.41MB
- USENIX SOUPS 2024/Evaluating the Usability of Differential Privacy Tools with Data Practitioners.mp412.01MB
- USENIX SOUPS 2024/Evolving Landscape of Disinformation - Lessons Learned So Far.mp44.51MB
- USENIX SOUPS 2024/Exploring Expandable-Grid Designs to Make iOS App Privacy Labels More Usable.mp411.7MB
- USENIX SOUPS 2024/From Laughter to Concern Exploring Conversations about Deepfakes on Reddit - Trends.mp47.1MB
- USENIX SOUPS 2024/How Entertainment Journalists Manage Online Hate and Harassment.mp410.04MB
- USENIX SOUPS 2024/Human-in-the-Loop for Secure Digital Wallets Transactions.mp45.25MB
- USENIX SOUPS 2024/I can say I'm John Travoltabut I'm not John Travolta - Investigating the Impact of.mp410.83MB
- USENIX SOUPS 2024/I do (not) need that Feature - Understanding Users’ Awareness and Control of Privacy.mp411.56MB
- USENIX SOUPS 2024/I would not install an app with this label - Privacy Label Impact on Risk Perception.mp415.38MB
- USENIX SOUPS 2024/It was honestly just gambling - Investigating the Experiences of Teenage.mp49.56MB
- USENIX SOUPS 2024/Media Portrayals of Student Privacy in Higher Education A 2013-2023 Review.mp44.43MB
- USENIX SOUPS 2024/Navigating Autonomy Unveiling Security Experts' Perspectives on Augmented Intelligence.mp47.92MB
- USENIX SOUPS 2024/Negative Effects of Social Triggers on User Security and Privacy Behaviors.mp410.7MB
- USENIX SOUPS 2024/Of Mothers and Managers - The Effect of Videos Depicting Gender Stereotypes on Women.mp49.83MB
- USENIX SOUPS 2024/Privacy Communication Patterns for Domestic Robots.mp411.29MB
- USENIX SOUPS 2024/Privacy Requirements and Realities of Digital Public Goods.mp49.72MB
- USENIX SOUPS 2024/Reflecting on Twenty Years of Usable Privacy and Security.mp436.77MB
- USENIX SOUPS 2024/Say I'm in publicI don't want my nudes to pop up. - User Threat Models for Using.mp49.89MB
- USENIX SOUPS 2024/SecureCheck Access Contracts, Negotiations, and Recommendations for Data-Sharing.mp44.7MB
- USENIX SOUPS 2024/The Golden xCOMPASS The Compass You Need to Navigate through the App-Privacy Universe.mp46.14MB
- USENIX SOUPS 2024/Threat modeling state of practice in Dutch organizations.mp410.16MB
- USENIX SOUPS 2024/Towards Bridging the Research-Practice Gap Understanding Researcher-Practitioner.mp410.02MB
- USENIX SOUPS 2024/Understanding How People Share Passwords.mp48.47MB
- USENIX SOUPS 2024/Violation of my body - Perceptions of AI-generated non-consensual (intimate) imagery.mp47.72MB
- USENIX SOUPS 2024/Well-intended but half-hearted Hosts’ consideration of guests’ privacy using smart.mp411.78MB
- USENIX SOUPS 2024/What Drives SMiShing Susceptibility A U.S. Interview Study of How and Why Mobile Phone.mp412.57MB
- USENIX SOUPS 2024/What Motivates and Discourages Employees in Phishing Interventions An Exploration of.mp410.09MB
- USENIX SOUPS 2024/Who is the IT Department Anyway An Evaluative Case Study of Shadow IT Mindsets Among.mp411.21MB
- USENIX SOUPS 2024/Write, Read, or Fix Exploring Alternative Methods for Secure Development Studies.mp411.11MB
不会用的朋友看这里
把磁力链接复制到离线下载,或者bt下载软件里即可下载文件,或者直接复制迅雷链接到迅雷里下载!
亲,你造吗?将网页分享给您的基友,下载的人越多速度越快哦!
违规内容投诉邮箱:[email protected]
概述
838888磁力搜索是一个磁力链接搜索引擎,是学术研究的副产品,用于解决资源过度分散的问题
它通过BitTorrent协议加入DHT网络,实时的自动采集数据,仅存储文件的标题、大小、文件列表、文件标识符(磁力链接)等基础信息
838888磁力搜索不下载任何真实资源,无法判断资源的合法性及真实性,使用838888磁力搜索服务的用户需自行鉴别内容的真伪
838888磁力搜索不上传任何资源,不提供Tracker服务,不提供种子文件的下载,这意味着838888磁力搜索 838888磁力搜索是一个完全合法的系统