Kent E. Seamons
Orcid: 0000-0002-1482-492XAffiliations:
- Brigham Young University, Provo, Utah, USA
According to our database1,
Kent E. Seamons
authored at least 99 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers.
CoRR, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 2024 European Symposium on Usable Security, 2024
2023
InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users.
CoRR, 2023
Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations.
Proceedings of the 32nd USENIX Security Symposium, 2023
"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager.
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Proceedings of the 2022 New Security Paradigms Workshop, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Financial Cryptography and Data Security, 2021
2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
ACM Trans. Priv. Secur., 2019
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
2017
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
Proceedings of the 26th USENIX Security Symposium, 2017
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
2016
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
CoRR, 2016
Proceedings of the 29th Annual Symposium on User Interface Software and Technology, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the 2016 New Security Paradigms Workshop, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
CoRR, 2015
Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client.
CoRR, 2015
MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research.
CoRR, 2015
Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email.
CoRR, 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Symposium On Usable Privacy and Security, 2013
2012
Proceedings of the 2012 International Conference on Privacy, 2012
2011
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
iDataGuard: an interoperable security middleware for untrusted internet data storage.
Proceedings of the Middleware 2008, 2008
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage.
Proceedings of the EDBT 2008, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the ISWC*04 Workshop on Trust, 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web.
Proceedings of the Semantic Web: Research and Applications, 2004
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks.
Proceedings of the Communications and Multimedia Security, 2004
2003
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Network and Distributed System Security Symposium, 2002
2001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001
Proceedings of the CCS 2001, 2001
1997
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997
Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997
Proceedings of the Fifth Workshop on I/O in Parallel and Distributed Systems, 1997
Internet Credential Acceptance Policies.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997
1996
Proceedings of the Eighth International Conference on Scientific and Statistical Database Management, 1996
Proceedings of the 1996 ACM/IEEE Conference on Supercomputing, 1996
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996
1995
Proceedings of the Proceedings Supercomputing '95, San Diego, CA, USA, December 4-8, 1995, 1995
1994
Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications.
Proceedings of the Seventh International Working Conference on Scientific and Statistical Database Management, 1994
Proceedings of the Proceedings Supercomputing '94, 1994