skip to main content
10.1145/1572532.1572578acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
poster

Conditioned-safe ceremonies and a user study of an application to web authentication

Published: 15 July 2009 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2021)Phishing Attacks in Mobile PlatformsResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch013(247-266)Online publication date: 2021
  • (2021)Phishing Attacks in Mobile PlatformsEncyclopedia of Organizational Knowledge, Administration, and Technology10.4018/978-1-7998-3473-1.ch084(1228-1246)Online publication date: 2021
  • (2021)You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset ProceduresDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-030-80825-9_1(1-20)Online publication date: 9-Jul-2021
  • Show More Cited By

Index Terms

  1. Conditioned-safe ceremonies and a user study of an application to web authentication

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security
        July 2009
        205 pages
        ISBN:9781605587363
        DOI:10.1145/1572532

        Sponsors

        • Carnegie Mellon CyLab
        • Google Inc.

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 July 2009

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Poster

        Conference

        SOUPS '09
        Sponsor:
        SOUPS '09: Symposium on Usable Privacy and Security
        July 15 - 17, 2009
        California, Mountain View, USA

        Acceptance Rates

        SOUPS '09 Paper Acceptance Rate 15 of 49 submissions, 31%;
        Overall Acceptance Rate 15 of 49 submissions, 31%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2021)Phishing Attacks in Mobile PlatformsResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch013(247-266)Online publication date: 2021
        • (2021)Phishing Attacks in Mobile PlatformsEncyclopedia of Organizational Knowledge, Administration, and Technology10.4018/978-1-7998-3473-1.ch084(1228-1246)Online publication date: 2021
        • (2021)You’ve Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset ProceduresDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-030-80825-9_1(1-20)Online publication date: 9-Jul-2021
        • (2018)Web Password Recovery: A Necessary Evil?Proceedings of the Future Technologies Conference (FTC) 201810.1007/978-3-030-02683-7_23(324-341)Online publication date: 20-Oct-2018
        • (2017)End-to-End PasswordsProceedings of the 2017 New Security Paradigms Workshop10.1145/3171533.3171542(107-121)Online publication date: 1-Oct-2017
        • (2017)I'm too Busy to Reset my LinkedIn PasswordProceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025788(387-391)Online publication date: 2-May-2017
        • (2017)The Password Reset MitM Attack2017 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2017.9(251-267)Online publication date: May-2017
        • (2017)SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit2017 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2017.38(99-120)Online publication date: May-2017
        • (2017)Ceremonies for End-to-End Verifiable ElectionsProceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 1017510.1007/978-3-662-54388-7_11(305-334)Online publication date: 28-Mar-2017
        • (2016)Effective Defense Schemes for Phishing Attacks on Mobile Computing PlatformsIEEE Transactions on Vehicular Technology10.1109/TVT.2015.247299365:8(6678-6691)Online publication date: Aug-2016
        • Show More Cited By

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media