| Confused Johnny: when automatic encryption leads to confusion and mistakes S Ruoti, N Kim, B Burgon, T Van Der Horst, K Seamons Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013 | 147 | 2013 |
| Why Johnny still, still can't encrypt: Evaluating the usability of a modern PGP client S Ruoti, J Andersen, D Zappala, K Seamons arXiv preprint arXiv:1510.08555, 2015 | 145 | 2015 |
| A tale of two studies: The best and worst of yubikey usability J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons 2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018 | 143 | 2018 |
| " We're on the Same Page" A Usability Study of Secure Email Using Pairs of Novice Users S Ruoti, J Andersen, S Heidbrink, M O'Neill, E Vaziripour, J Wu, ... Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 111 | 2016 |
| That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers S Oesch, S Ruoti Proceedings of the 29th USENIX Conference on Security Symposium, 2165-2182, 2020 | 110 | 2020 |
| TLS proxies: Friend or foe? M O'Neill, S Ruoti, K Seamons, D Zappala Proceedings of the 2016 Internet Measurement Conference, 551-557, 2016 | 99 | 2016 |
| Blockchain technology: what is it good for? S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham Communications of the ACM 63 (1), 46-53, 2019 | 86 | 2019 |
| Authentication melee: A usability analysis of seven web authentication systems S Ruoti, B Roberts, K Seamons Proceedings of the 24th international conference on world wide web, 916-926, 2015 | 86 | 2015 |
| Weighing context and trade-offs: How suburban adults selected their online security posture S Ruoti, T Monson, J Wu, D Zappala, K Seamons Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 211-228, 2017 | 68 | 2017 |
| Private webmail 2.0: Simple and easy-to-use secure email S Ruoti, J Andersen, T Hendershot, D Zappala, K Seamons Proceedings of the 29th Annual Symposium on User Interface Software and …, 2016 | 58 | 2016 |
| “it basically started using me:” an observational study of password manager usage S Oesch, S Ruoti, J Simmons, A Gautam Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 46 | 2022 |
| A comparative usability study of key management in secure email S Ruoti, J Andersen, T Monson, D Zappala, K Seamons Fourteenth symposium on usable privacy and security (SOUPS 2018), 375-394, 2018 | 44 | 2018 |
| Johnny's journey toward usable secure email S Ruoti, K Seamons IEEE Security & Privacy 17 (6), 72-76, 2019 | 42 | 2019 |
| {TrustBase}: An architecture to repair and strengthen certificate-based authentication M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ... 26th USENIX Security Symposium (USENIX Security 17), 609-624, 2017 | 35 | 2017 |
| A usability study of four secure email tools using paired participants S Ruoti, J Andersen, L Dickinson, S Heidbrink, T Monson, M O'neill, ... ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-33, 2019 | 29 | 2019 |
| SoK: Blockchain technology and its potential use cases S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham arXiv preprint arXiv:1909.12454, 2019 | 27 | 2019 |
| Strengthening password-based authentication S Ruoti, J Andersen, K Seamons Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 27 | 2016 |
| Systematization of password manageruse cases and design paradigms J Simmons, O Diallo, S Oesch, S Ruoti Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 26 | 2021 |
| Sencaptcha: A mobile-first captcha using orientation sensors Y Feng, Q Cao, H Qi, S Ruoti Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020 | 26 | 2020 |
| Messageguard: A browser-based platform for usable, content-based encryption research S Ruoti, J Andersen, T Monson, D Zappala, K Seamons arXiv preprint arXiv:1510.08943, 2015 | 25 | 2015 |