Usable Security vs. Workflow Realities. Blythe, J., Kothari, V., Smith, S., & Koppel, R. In NDSS Workshop on Usable Security, 2018. bibtex @inproceedings{blythe-usec18,
title={Usable Security vs. Workflow Realities},
author={Blythe, Jim and Kothari, Vijay and Smith, Sean and Koppel, Ross},
booktitle={NDSS Workshop on Usable Security},
year={2018}}
Downloads: 0
{"_id":"bQt8kG56yowfQaCRh","bibbaseid":"blythe-kothari-smith-koppel-usablesecurityvsworkflowrealities-2018","author_short":["Blythe, J.","Kothari, V.","Smith, S.","Koppel, R."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Usable Security vs. Workflow Realities","author":[{"propositions":[],"lastnames":["Blythe"],"firstnames":["Jim"],"suffixes":[]},{"propositions":[],"lastnames":["Kothari"],"firstnames":["Vijay"],"suffixes":[]},{"propositions":[],"lastnames":["Smith"],"firstnames":["Sean"],"suffixes":[]},{"propositions":[],"lastnames":["Koppel"],"firstnames":["Ross"],"suffixes":[]}],"booktitle":"NDSS Workshop on Usable Security","year":"2018","bibtex":"@inproceedings{blythe-usec18,\n\ttitle={Usable Security vs. Workflow Realities},\n\tauthor={Blythe, Jim and Kothari, Vijay and Smith, Sean and Koppel, Ross},\n\tbooktitle={NDSS Workshop on Usable Security},\n\tyear={2018}}\n\n","author_short":["Blythe, J.","Kothari, V.","Smith, S.","Koppel, R."],"key":"blythe-usec18","id":"blythe-usec18","bibbaseid":"blythe-kothari-smith-koppel-usablesecurityvsworkflowrealities-2018","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/7ARtSDwPNggwcCknn","dataSources":["3RgTEHT74HqSAxHWs","2XWLihFP5gomjJfjb","wEye3NuzhzZ5vKsHp","MRqWkhrkLtSkHzwxi"],"keywords":[],"search_terms":["usable","security","workflow","realities","blythe","kothari","smith","koppel"],"title":"Usable Security vs. Workflow Realities","year":2018}