Menu
Internet Security Research Lab

Internet Security Research Lab

Researching and developing usable, secure systems that target ordinary users

Primary Menu

Skip to content
  • Home
  • Recent News
  • People
    • Kent Seamons
    • Scott Ruoti (Collaborator)
    • Alumni
  • Projects
    • Secure Communication
    • Password-based Authentication
    • Strengthening SSL
    • Usable Security
    • Past Projects
  • Publications
    • Selected Papers By Topic
    • All Papers
    • Posters
    • Preprints
    • Presentations
    • Technical Reports
    • Theses
  • Data
    • A Comparative Usability Study of Key Management in Secure Email
    • A Tale of Two Studies: The Best and Worst of YubiKey Usability
    • A Usability Study of Secure Email Deletion
    • A Usability Study of Four Secure Email Tools Using Paired Participants
    • Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture
    • Private Webmail 2.0: Simple and Easy-to-Use Secure Email
    • User Attitudes Toward the Inspection of Encrypted Traffic
    • “We’re on the Same Page”: A Usability Study of Secure Email Using Pairs of Novice Users
  • About
Search

Month: July 2013

SOUPS 2013 Paper: Confused Johnny

Posted on2013/07/242015/05/16Leave a comment

Scott Ruoti presented the paper  Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes 9th Annual Symposium on Usable Privacy and Security (SOUPS 2013), Newcastle, United Kingdom, July 2013.

Copyright © 2021 Internet Security Research Lab. All Rights Reserved. | Catch Responsive by Catch Themes
Scroll Up
  • Home
  • Recent News
  • People
    • Kent Seamons
    • Scott Ruoti (Collaborator)
    • Alumni
  • Projects
    • Secure Communication
    • Password-based Authentication
    • Strengthening SSL
    • Usable Security
    • Past Projects
  • Publications
    • Selected Papers By Topic
    • All Papers
    • Posters
    • Preprints
    • Presentations
    • Technical Reports
    • Theses
  • Data
    • A Comparative Usability Study of Key Management in Secure Email
    • A Tale of Two Studies: The Best and Worst of YubiKey Usability
    • A Usability Study of Secure Email Deletion
    • A Usability Study of Four Secure Email Tools Using Paired Participants
    • Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture
    • Private Webmail 2.0: Simple and Easy-to-Use Secure Email
    • User Attitudes Toward the Inspection of Encrypted Traffic
    • “We’re on the Same Page”: A Usability Study of Secure Email Using Pairs of Novice Users
  • About