Elham Vaziripour

According to our database1, Elham Vaziripour authored at least 14 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Secure Messaging Authentication Ceremonies Are Broken.
IEEE Secur. Priv., 2021

2019
A Usability Study of Four Secure Email Tools Using Paired Participants.
ACM Trans. Priv. Secur., 2019

"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Social Authentication for End-to-End Encryption.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Condensing Steam: Distilling the Diversity of Gamer Behavior.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Analyzing the Political Sentiment of Tweets in Farsi.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

A case study of a systematic attack design method for critical infrastructure cyber-physical systems.
Proceedings of the 2016 American Control Conference, 2016

2015
Johnny and Jane: Analyzing Secure Email Using Two Novice Users.
CoRR, 2015

2014
Vulnerability analysis for distributed and coordinated destabilization attacks.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2009
Design of a Fairness and Scalable Distributed Mobile Auction.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2009


  Loading...