Kent E. Seamons

Orcid: 0000-0002-1482-492X

Affiliations:
  • Brigham Young University, Provo, Utah, USA


According to our database1, Kent E. Seamons authored at least 98 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers.
CoRR, 2024

2023
InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users.
CoRR, 2023

A Security and Usability Analysis of Local Attacks Against FIDO2.
CoRR, 2023

Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations.
Proceedings of the 32nd USENIX Security Symposium, 2023

"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Passwords and Cryptwords: The Final Limits on Lengths.
Proceedings of the 2022 New Security Paradigms Workshop, 2022

Poster: User-controlled System-level Encryption for all Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Automatic Detection of Fake Key Attacks in Secure Messaging.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Privacy-Enhancing Technologies.
Modern Socio-Technical Perspectives on Privacy, 2022

2021
Secure Messaging Authentication Ceremonies Are Broken.
IEEE Secur. Priv., 2021

SoK: Securing Email - A Stakeholder-Based Analysis.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Let's Revoke: Scalable Global Certificate Revocation.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
A Usability Study of Four Secure Email Tools Using Paired Participants.
ACM Trans. Priv. Secur., 2019

The Meaning of Identity on the Internet.
IEEE Internet Comput., 2019

Johnny's Journey Toward Usable Secure Email.
IEEE Secur. Priv., 2019

"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

A Usability Study of Five Two-Factor Authentication Methods.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Leveraging locality of reference for certificate revocation.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
The Secure Socket API: TLS as an Operating System Service.
login Usenix Mag., 2018

Securing Email.
CoRR, 2018

The Secure Socket API: TLS as an Operating System Service.
Proceedings of the 27th USENIX Security Symposium, 2018

A Tale of Two Studies: The Best and Worst of YubiKey Usability.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

A Comparative Usability Study of Key Management in Secure Email.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
TLS Inspection: How Often and Who Cares?
IEEE Internet Comput., 2017

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
Proceedings of the 26th USENIX Security Symposium, 2017

Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Augmenting Centralized Password Management with Application-Specific Passwords.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Layering Security at Global Control Points to Secure Unmodified Software.
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017

End-to-End Passwords.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

2016
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.
CoRR, 2016

Private Webmail 2.0: Simple and Easy-to-Use Secure Email.
Proceedings of the 29th Annual Symposium on User Interface Software and Technology, 2016

Social Authentication for End-to-End Encryption.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Standard Metrics and Scenarios for Usable Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

User Attitudes Toward the Inspection of Encrypted Traffic.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Strengthening Password-based Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Content-based security for the web.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

TLS Proxies: Friend or Foe?
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
At Least Tell Me: User Attitudes Toward the Inspection of Encrypted Traffic.
CoRR, 2015

Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client.
CoRR, 2015

MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research.
CoRR, 2015

Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email.
CoRR, 2015

Johnny and Jane: Analyzing Secure Email Using Two Novice Users.
CoRR, 2015

Authentication Melee: A Usability Analysis of Seven Web Authentication Systems.
Proceedings of the 24th International Conference on World Wide Web, 2015

2014
POSTER: TLS Proxies: Friend or Foe?
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
A middleware approach for outsourcing data securely.
Comput. Secur., 2013

Confused Johnny: when automatic encryption leads to confusion and mistakes.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Private Facebook Chat.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
DataVault: secure mobile access and data sharing.
Netw. Secur., 2011

2008
CPG: closed pseudonymous groups.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Wireless authentication using remote passwords.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Or Best Offer: A Privacy Policy Negotiation Protocol.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

iDataGuard: an interoperable security middleware for untrusted internet data storage.
Proceedings of the Middleware 2008, 2008

iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage.
Proceedings of the EDBT 2008, 2008

pwdArmor: Protecting Conventional Password-Based Authentications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Simple authentication for the web.
Proceedings of the 16th International Conference on World Wide Web, 2007

gVault: A Gmail Based Cryptographic Network File System.
Proceedings of the Data and Applications Security XXI, 2007

Extensible Pre-authentication Kerberos.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Logcrypt: Forward Security and Public Verification for Secure Audit Logs.
IACR Cryptol. ePrint Arch., 2005

Short Paper: Thor - The Hybrid Online Repository.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Adaptive trust negotiation and access control.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Adaptive trust negotiation and access control for grids.
Proceedings of the 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), 2005

2004
Content-triggered trust negotiation.
ACM Trans. Inf. Syst. Secur., 2004

Concealing Complex Policies with Hidden Credentials.
IACR Cryptol. ePrint Arch., 2004

How to Exploit Ontologies for Trust Negotiation.
Proceedings of the ISWC*04 Workshop on Trust, 2004

Responding to Policies at Runtime in TrustBuilder.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web.
Proceedings of the Semantic Web: Research and Applications, 2004

Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks.
Proceedings of the Communications and Multimedia Security, 2004

2003
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003

Hidden Credentials.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

An access control model for dynamic client-side content.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Trust Negotiation in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

TrustBuilder: Negotiating Trust in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Negotiating Trust on the Web.
IEEE Internet Comput., 2002

Selective disclosure credential sets.
IACR Cryptol. ePrint Arch., 2002

Requirements for Policy Languages for Trust Negotiation.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Protecting Privacy during On-Line Trust Negotiation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Advanced Client/Server Authentication in TLS.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001

Interoperable strategies in automated trust negotiation.
Proceedings of the CCS 2001, 2001

1997
Document Ranking and the Vector-Space Model.
IEEE Softw., 1997

Parallel Input/Output with Heterogeneous Disks.
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997

Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations.
Proceedings of the Fifth Workshop on I/O in Parallel and Distributed Systems, 1997

Internet Credential Acceptance Policies.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997

1996
Multidimensional array I/O in Panda 1.0.
J. Supercomput., 1996

Persistent Array Access Using Server-Directed I/O.
Proceedings of the Eighth International Conference on Scientific and Statistical Database Management, 1996

Performance Modeling for the Panda Array I/O Library.
Proceedings of the 1996 ACM/IEEE Conference on Supercomputing, 1996

Scalable Message Passing in Panda.
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996

1995
Server-Directed Collective I/O in Panda.
Proceedings of the Proceedings Supercomputing '95, San Diego, CA, USA, December 4-8, 1995, 1995

1994
Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications.
Proceedings of the Seventh International Working Conference on Scientific and Statistical Database Management, 1994

An efficient abstract interface for multidimensional array I/O.
Proceedings of the Proceedings Supercomputing '94, 1994


  Loading...