Simson Garfinkel

Results: 37



#Item
1Cryptography / Cryptographic software / Technical communication / E-commerce / Microsoft CryptoAPI / Public-key cryptography / Key / Usability / RSA / Application programming interface / Symmetric-key algorithm / OpenSSL

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
2

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:35
    3

    Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

    Add to Reading List

    Source URL: obj.umiacs.umd.edu

    - Date: 2017-05-15 16:43:59
      4

      Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express Simson L. Garfinkel Robert C. Miller

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      - Date: 2005-05-30 16:31:14
        5

        Patterns for Aligning Security and Usability [Poster] Simson L. Garfinkel Robert C. Miller

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        - Date: 2005-06-21 09:58:18
          6

          Secure Web Authentication with Mobile Phones Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial Intelligence Lab, 32 Vassar Street, Cambridge MA 02139 {minwu, simsong, rcm}@csail.mit.edu As compu

          Add to Reading List

          Source URL: dimacs.rutgers.edu

          - Date: 2004-05-05 09:44:02
            7One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

            Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2007-06-08 09:53:29
            8Jewish surnames / Security / Surname / Simson Garfinkel / Cryptography / Crime prevention / Information governance / National security / Garfinkel / Simson / Computer security

            Introduction to Computer Security and Privacy Simson L. Garfinkel, Ph.D. http://www.simson.net/

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2005-06-21 11:48:48
            9Humancomputer interaction / Usability / Human communication / Computer security / Paul Dourish / User interfaces / Lorrie Cranor / Usability engineering / User experience / Simson Garfinkel / Ethnomethodology / Privacy

            Ethnomethodology and Usable Security: The Value of Descriptive Research for Graduate Students Hervé Saint-Louis, PhD Student, Faculty of Information, University of Toronto Instrumental, cognitive and behavioural approac

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2015-07-17 22:36:03
            10Laptops / Technology / Bitfrost / OLPC XO-1 / Sugar / Prey / Security token / Malware / Linux / One Laptop per Child / Computing / Classes of computers

            Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2007-06-08 09:53:29
            UPDATE