Automated trust negotiation WH Winsborough, KE Seamons, VE Jones Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 693 | 2000 |
Document ranking and the vector-space model DL Lee, H Chuang, K Seamons IEEE software 14 (2), 67-75, 1997 | 620 | 1997 |
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation T Yu, M Winslett, KE Seamons ACM Transactions on Information and System Security (TISSEC) 6 (1), 1-42, 2003 | 422 | 2003 |
Server-directed collective I/O in Panda KE Seamons, Y Chen, P Jones, J Jozwiak, M Winslett Supercomputing'95: Proceedings of the 1995 ACM/IEEE Conference on …, 1995 | 326 | 1995 |
Negotiating trust in the Web M Winslett, T Yu, KE Seamons, A Hess, J Jacobson, R Jarvis, B Smith, ... IEEE Internet Computing 6 (6), 30-37, 2002 | 314 | 2002 |
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. KE Seamons, M Winslett, T Yu NDSS, 2001 | 244 | 2001 |
Interoperable strategies in automated trust negotiation T Yu, M Winslett, KE Seamons Proceedings of the 8th ACM Conference on Computer and Communications …, 2001 | 241 | 2001 |
Hidden credentials JE Holt, RW Bradshaw, KE Seamons, H Orman Proceedings of the 2003 ACM workshop on Privacy in the electronic society, 1-8, 2003 | 231 | 2003 |
Concealing complex policies with hidden credentials RW Bradshaw, JE Holt, KE Seamons Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 218 | 2004 |
Requirements for policy languages for trust negotiation KE Seamons, M Winslett, T Yu, B Smith, E Child, J Jacobson, H Mills, L Yu Proceedings Third International Workshop on Policies for Distributed Systems …, 2002 | 216 | 2002 |
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web R Gavriloaie, W Nejdl, D Olmedilla, KE Seamons, M Winslett European Semantic Web Symposium, 342-356, 2004 | 194 | 2004 |
A usability study of five {two-factor} authentication methods K Reese, T Smith, J Dutson, J Armknecht, J Cameron, K Seamons Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 357-370, 2019 | 192 | 2019 |
Logcrypt: forward security and public verification for secure audit logs JE Holt, KE Seamons Cryptology ePrint Archive, 2005 | 192 | 2005 |
Multi-channel user authentication apparatus system and method T van der Horst, K Seamons US Patent 8,151,116, 2012 | 165 | 2012 |
Adaptive trust negotiation and access control T Ryutov, L Zhou, C Neuman, T Leithead, KE Seamons Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 155 | 2005 |
Protecting privacy during on-line trust negotiation KE Seamons, M Winslett, T Yu, L Yu, R Jarvis Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003 | 149 | 2003 |
Confused Johnny: when automatic encryption leads to confusion and mistakes S Ruoti, N Kim, B Burgon, T Van Der Horst, K Seamons Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013 | 148 | 2013 |
Why Johnny still, still can't encrypt: Evaluating the usability of a modern PGP client S Ruoti, J Andersen, D Zappala, K Seamons arXiv preprint arXiv:1510.08555, 2015 | 131 | 2015 |
Advanced Client/Server Authentication in TLS. A Hess, J Jacobson, H Mills, R Wamsley, KE Seamons, B Smith NDSS, 2002 | 115 | 2002 |
" We're on the Same Page" A Usability Study of Secure Email Using Pairs of Novice Users S Ruoti, J Andersen, S Heidbrink, M O'Neill, E Vaziripour, J Wu, ... Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 108 | 2016 |