Scott Ruoti. Usable, Secure Content-Based Encryption on the Web. July 2017.
Tim van der Horst. Convenient Decentralized Authentication using Passwords. April 2010. [Presentation]
Brad Spendlove. Security Analysis and Recommendations for CONIKS as a PKI Solution for Mobile Applications. December 2018.
Luke Dickinson.Certificate Revocation Table: Leveraging Locality of Reference in Web Requests to Improve TLS Certificate Revocation. October 2018.
Ken Reese. Evaluating the Usability of Two-Factor Authentication. May 2018.
Tyler Monson. Usable Secure Email Through Short-Lived Keys. October 2016.
Travis Hendershot. Towards Using Certificate-Based Authentication as a Defense Against Evil Twins in 802.11 Networks. November 2016.
Jeff Andersen. The Quest to Secure Email: A Usability Analysis of Key Management Alternatives. July 2016.
Scott Ruoti. Authentication Melee: A Usability Analysis of Seven Web Authentication Systems. December 2014.
Song Yuanzheng. Browser-Based Manual Encryption. August 2014.
Ben Burgon. Pwm: A Secure Webmail System Designed for Easy Adoption. March 2014.
Nathan Kim. Message Protector: Demonstrating that Manual Encryption Improves Usability. May 2013.
Chris Robison. Secure Browser-Based Instant Messaging. December 2012.
Pavan Vankamamidi. Proofs of Correctness for Three Decentralized Authentication Protocols Using Strand Spaces. June 2011.
Scott Robertson. Trusted Mobile Overlays. April 2011.
Trevor Florence. KiwiVault: Encryption Software for Portable Storage Devices. December 2009.
Ryan Segeberg. EASEmail: Easy Accessible Secure Email. August 2009.
Reed Abbott. CPG: Closed Pseudonymous Groups. March 2008.
Andrew Harding. Wireless Authentication using Remote Passwords (WARP). January 2008.
Phillip Hellewell Extensible Pre-Authentication in Kerberos (EPAK). August 2007.
Nathan Seeley. Digital Receipts. November 2006.
Paul Porter. Trust Negotiation for Open Database Access Control. May 2006.
Cameron Morris. Browser Based Trust Negotiation. March 2006.
Michael Edvalson. TrustBroker: A Defense Against identify Theft From Online Transactions. December 2005.
Travis Leithead. Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies. August 2005.
Jim Henshaw. Phishing Warden: Enhancing Content-Triggered Trust Negotiation to Prevent Phishing Attacks. May 2005.
Tim van der Horst. Thor: The Hybrid Online Repository. February 2005.
Jason Holt. Logcrypt: Forward Security and Public Verification for Secure Audit Logs. February 2005.
Evan Child. Trust Negotiation Using Hidden Credentials. July 2004.
Robert Bradshaw. Concealing Complex Policies with Hidden Credentials. June 2004.
Thomas Chan. Preserving Trust Across Multiple Sessions in Open Systems. June 2004.
Bryan Smith. Responding to Policies at Runtime in TrustBuilder. March 2004.
Tore Sundelin. Surrogate Trust Negotiation. July 2003.
Jared Jacobson. Trust Negotiation In Session Level Protocols. July 2003.
Ryan Jarvis. Protecting Sensitive Credential Content During Trust Negotiation. April 2003.
Adam Hess. Content Triggered Trust Negotiation. February 2003.