Ceremony design and analysis, Cryptology ePrint Archive Report, p.739, 2007. ,
Representing Humans in System Security Models: An Actor-Network Approach, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.75-92, 2011. ,
Ceremonies design for PKIs hardware security modules, Proc. of the 9th Brazilian Symposium on Information and Computer System Security (NDSS'09), pp.115-128, 2009. ,
Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009. ,
DOI : 10.1145/1572532.1572578
The Inmates are Running the Asylum, 2004. ,
DOI : 10.1007/978-3-322-99786-9_1
Ceremony Analysis: Strengths and Weaknesses, Proc. of the 26th IFIP International Information Security Conference (IFIP SEC'11), 2011. ,
DOI : 10.1007/978-3-642-21424-0_9
URL : http://eprints.qut.edu.au/42327/1/42327S.pdf
Privacy indexes: A survey of westins studies, SCS Technical Report Collection, 2005. ,
Formal Correctness of Security Protocols. Information Security and Cryptography, 2007. ,
The Social Requirements of Technical Systems In: Socio-technical Design and Social Networking Systems, pp.3-22, 2009. ,
Social Protocols, 1998. ,
Seeing the Full Picture: the Case for Extending Security Ceremony Analysis URL: Privacy on the internet: Attitudes and be- haviours, Proceedings of the 9th Australian Information Security Management Conference, 2010. ,
What's out there? an evaluation of online identity management, 2010. ,
Development of measures of online privacy concern and protection for use on the Internet, Journal of the American Society for Information Science and Technology, vol.4, issue.2, pp.157-165, 2007. ,
DOI : 10.1002/asi.20459
The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors, Journal of Consumer Affairs, vol.14, issue.1 and 2, pp.100-126, 2007. ,
DOI : 10.1111/j.1745-6606.2006.00070.x
Internet users??? perceptions of ???privacy concerns??? and ???privacy actions???, International Journal of Human-Computer Studies, vol.65, issue.6, pp.526-536, 2007. ,
DOI : 10.1016/j.ijhcs.2006.12.001
On-line privacy and consent, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010. ,
DOI : 10.1145/1900546.1900560
Practice Makes Perfect: Motivating Confident Privacy Protection Practices, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.51
URL : http://repository.uwl.ac.uk/1407/
Service users' requirements for tools to support effective on-line privacy and consent practices, Proc. of the 15th Nordic Conference in Secure IT Systems (NordSec'10), pp.106-120, 2010. ,
Symbolic Model Checking, 1993. ,
Isabelle/HOL: A Proof Assistant for Higher-Order Logic, 2002. ,
DOI : 10.1007/3-540-45949-9