[go: up one dir, main page]

Follow
Scott Ruoti
Scott Ruoti
Associate Professor of Computer Science, University of Tennessee, Knoxville
Verified email at ruoti.org - Homepage
Title
Cited by
Cited by
Year
Confused Johnny: when automatic encryption leads to confusion and mistakes
S Ruoti, N Kim, B Burgon, T Van Der Horst, K Seamons
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
1472013
Why Johnny still, still can't encrypt: Evaluating the usability of a modern PGP client
S Ruoti, J Andersen, D Zappala, K Seamons
arXiv preprint arXiv:1510.08555, 2015
1452015
A tale of two studies: The best and worst of yubikey usability
J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons
2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018
1432018
" We're on the Same Page" A Usability Study of Secure Email Using Pairs of Novice Users
S Ruoti, J Andersen, S Heidbrink, M O'Neill, E Vaziripour, J Wu, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1112016
That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers
S Oesch, S Ruoti
Proceedings of the 29th USENIX Conference on Security Symposium, 2165-2182, 2020
1102020
TLS proxies: Friend or foe?
M O'Neill, S Ruoti, K Seamons, D Zappala
Proceedings of the 2016 Internet Measurement Conference, 551-557, 2016
992016
Blockchain technology: what is it good for?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
862019
Authentication melee: A usability analysis of seven web authentication systems
S Ruoti, B Roberts, K Seamons
Proceedings of the 24th international conference on world wide web, 916-926, 2015
862015
Weighing context and trade-offs: How suburban adults selected their online security posture
S Ruoti, T Monson, J Wu, D Zappala, K Seamons
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 211-228, 2017
682017
Private webmail 2.0: Simple and easy-to-use secure email
S Ruoti, J Andersen, T Hendershot, D Zappala, K Seamons
Proceedings of the 29th Annual Symposium on User Interface Software and …, 2016
582016
“it basically started using me:” an observational study of password manager usage
S Oesch, S Ruoti, J Simmons, A Gautam
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
462022
A comparative usability study of key management in secure email
S Ruoti, J Andersen, T Monson, D Zappala, K Seamons
Fourteenth symposium on usable privacy and security (SOUPS 2018), 375-394, 2018
442018
Johnny's journey toward usable secure email
S Ruoti, K Seamons
IEEE Security & Privacy 17 (6), 72-76, 2019
422019
{TrustBase}: An architecture to repair and strengthen certificate-based authentication
M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ...
26th USENIX Security Symposium (USENIX Security 17), 609-624, 2017
352017
A usability study of four secure email tools using paired participants
S Ruoti, J Andersen, L Dickinson, S Heidbrink, T Monson, M O'neill, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-33, 2019
292019
SoK: Blockchain technology and its potential use cases
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
arXiv preprint arXiv:1909.12454, 2019
272019
Strengthening password-based authentication
S Ruoti, J Andersen, K Seamons
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
272016
Systematization of password manageruse cases and design paradigms
J Simmons, O Diallo, S Oesch, S Ruoti
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
262021
Sencaptcha: A mobile-first captcha using orientation sensors
Y Feng, Q Cao, H Qi, S Ruoti
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
262020
Messageguard: A browser-based platform for usable, content-based encryption research
S Ruoti, J Andersen, T Monson, D Zappala, K Seamons
arXiv preprint arXiv:1510.08943, 2015
252015
The system can't perform the operation now. Try again later.
Articles 1–20