What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sonia Chiasson
Google Scholar
ORCID:
0000-0001-7314-2198
27
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/compsec
Influences of displaying permission-related information on web single sign-on login decisions.
Srivathsan G. Morkonda
Sonia Chiasson
Paul C. van Oorschot
2024
conf/nspw
Balancing Security and Longevity: Benefits of Modular IoT Infrastructure.
Maxwell Keleher
David Barrera
Sonia Chiasson
2021
conf/uss
Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols.
Enis Ulqinaku
Hala Assal
AbdelRahman Abdou
Sonia Chiasson
Srdjan Capkun
2021
conf/soups
"I'm Literally Just Hoping This Will Work: " Obstacles Blocking the Online Security and Privacy of Users with Visual Disabilities.
Daniela Napoli
Khadija Baig
Sana Maqsood
Sonia Chiasson
2021
conf/soups
Replication: Effects of Media on the Mental Models of Technical Users.
Khadija Baig
Elisa Kazan
Kalpana Hundlani
Sana Maqsood
Sonia Chiasson
2021
conf/soups
"Whether it's moral is a whole other story": Consumer perspectives on privacy regulations and corporate data practices.
Leah Zhang-Kennedy
Sonia Chiasson
2019
conf/nspw
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm.
Fiona Westin
Sonia Chiasson
2018
conf/ccs
Assessing Non-Visual SSL Certificates with Desktop and Mobile Screen Readers.
Daniela Napoli
Sonia Chiasson
2018
conf/uss
The aftermath of a crypto-ransomware attack at a large academic institution.
Leah Zhang-Kennedy
Hala Assal
Jessica N. Rocheleau
Reham Mohamed
Khadija Baig
Sonia Chiasson
2018
conf/soups
Online Privacy and Aging of Digital Artifacts.
Reham Ebada Mohamed
Sonia Chiasson
2018
conf/soups
Security in the Software Development Lifecycle.
Hala Assal
Sonia Chiasson
2015
conf/nspw
Choose Your Own Authentication.
Alain Forget
Sonia Chiasson
Robert Biddle
2015
conf/soups
User Perceptions of Sharing, Advertising, and Tracking.
Farah Chanchary
Sonia Chiasson
2013
conf/ccs
A clinical study of risk factors related to malware infections.
Fanny Lalonde Lévesque
Jude Nsiempba
José M. Fernandez
Sonia Chiasson
Anil Somayaji
2013
conf/ccs
Passwords on flexible display devices.
Sana Maqsood
Sonia Chiasson
Audrey Girouard
2012
conf/uss
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion.
Yi Xu
Gerardo Reynaga
Sonia Chiasson
Jan-Michael Frahm
Fabian Monrose
Paul C. van Oorschot
2012
conf/fc
Methodology for a Field Study of Anti-malware Software.
Fanny Lalonde Lévesque
Carlton R. Davis
José M. Fernandez
Sonia Chiasson
Anil Somayaji
2012
conf/fc
The MVP Web-Based Authentication Framework - (Short Paper).
Sonia Chiasson
Chris Deschamps
Elizabeth Stobert
Max Hlywa
Bruna Freitas Machado
Alain Forget
Nicholas Wright
Gerry Chan
Robert Biddle
2012
conf/fc
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Serge Egelman
Joseph Bonneau
Sonia Chiasson
David Dittrich
Stuart E. Schechter
2012
conf/acsac
Tapas: design, implementation, and usability evaluation of a password manager.
Daniel McCarney
David Barrera
Jeremy Clark
Sonia Chiasson
Paul C. van Oorschot
2010
conf/acsac
Exploring usability effects of increasing security in click-based graphical passwords.
Elizabeth Stobert
Alain Forget
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
2009
conf/ccs
Multiple password interference in text passwords and click-based graphical passwords.
Sonia Chiasson
Alain Forget
Elizabeth Stobert
Paul C. van Oorschot
Robert Biddle
2008
conf/soups
Improving text passwords through persuasion.
Alain Forget
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
2007
conf/soups
Helping users create better passwords: is this the right approach?
Alain Forget
Sonia Chiasson
Robert Biddle
2007
conf/soups
A second look at the usability of click-based graphical passwords.
Sonia Chiasson
Robert Biddle
Paul C. van Oorschot
2007
conf/esorics
Graphical Password Authentication Using Cued Click Points.
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
2006
conf/uss
A Usability Study and Critique of Two Password Managers.
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
Coauthors
AbdelRahman Abdou
(1)
Alain Forget
(6)
Anil Somayaji
(2)
Audrey Girouard
(1)
Bruna Freitas Machado
(1)
Carlton R. Davis
(1)
Chris Deschamps
(1)
Daniel McCarney
(1)
Daniela Napoli
(2)
David Barrera
(2)
David Dittrich
(1)
Elisa Kazan
(1)
Elizabeth Stobert
(3)
Enis Ulqinaku
(1)
Fabian Monrose
(1)
Fanny Lalonde Lévesque
(2)
Farah Chanchary
(1)
Fiona Westin
(1)
Gerardo Reynaga
(1)
Gerry Chan
(1)
Hala Assal
(3)
Jan-Michael Frahm
(1)
Jeremy Clark
(1)
Jessica N. Rocheleau
(1)
José M. Fernandez
(2)
Joseph Bonneau
(1)
Jude Nsiempba
(1)
Kalpana Hundlani
(1)
Khadija Baig
(3)
Leah Zhang-Kennedy
(2)
Max Hlywa
(1)
Maxwell Keleher
(1)
Nicholas Wright
(1)
Paul C. van Oorschot
(9)
Reham Ebada Mohamed
(1)
Reham Mohamed
(1)
Robert Biddle
(9)
Sana Maqsood
(3)
Serge Egelman
(1)
Sonia Chiasson
(27)
Srdjan Capkun
(1)
Srivathsan G. Morkonda
(1)
Stuart E. Schechter
(1)
Yi Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to