Usable security has unique usability challenges because the need for security often means that standard humancomputer-interaction approaches cannot be directly applied. An importa...
Sonia Chiasson, Alain Forget, Robert Biddle, Paul ...
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Graphical passwords have been proposed to address known problems with traditional text passwords. For example, memorable user-chosen text passwords are predictable, but random sys...
Elizabeth Stobert, Alain Forget, Sonia Chiasson, P...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...