What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Robert Biddle
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/soups
Language as Lure: A Naturalistic Study on Pasifika Phishing Susceptibility.
Eric Spero
Isa Seow
Lucas Betts
Eddie Fuatimau
Robert Biddle
Danielle M. Lottridge
Giovanni Russello
2020
conf/nspw
Out of Sight, Out of Mind: UI Design and the Inhibition of Mental Models of Security.
Eric Spero
Robert Biddle
2015
conf/nspw
Choose Your Own Authentication.
Alain Forget
Sonia Chiasson
Robert Biddle
2014
conf/ccs
SIW 2014: First Workshop on Security Information Workers.
Emerson R. Murphy-Hill
Heather Richter Lipford
Bill Chu
Robert Biddle
2014
conf/ccs
ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis.
Jeff Wilson
Judith M. Brown
Robert Biddle
2014
conf/nspw
A Password Manager that Doesn't Remember Passwords.
Elizabeth Stobert
Robert Biddle
2014
conf/soups
The Password Life Cycle: User Behaviour in Managing Passwords.
Elizabeth Stobert
Robert Biddle
2013
conf/soups
Memory retrieval and graphical passwords.
Elizabeth Stobert
Robert Biddle
2012
conf/fc
The MVP Web-Based Authentication Framework - (Short Paper).
Sonia Chiasson
Chris Deschamps
Elizabeth Stobert
Max Hlywa
Bruna Freitas Machado
Alain Forget
Nicholas Wright
Gerry Chan
Robert Biddle
2012
conf/soups
Do you see your password?: applying recognition to textual passwords.
Nicholas Wright
Andrew S. Patrick
Robert Biddle
2011
journals/tifs
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
Robert Biddle
Mohammad Mannan
Paul C. van Oorschot
Tara Whalen
2011
conf/acsac
Facing the facts about image type in recognition-based graphical passwords.
Max Hlywa
Robert Biddle
Andrew S. Patrick
2010
conf/acsac
Exploring usability effects of increasing security in click-based graphical passwords.
Elizabeth Stobert
Alain Forget
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
2009
conf/ccs
Browser interfaces and extended validation SSL certificates: an empirical study.
Robert Biddle
Paul C. van Oorschot
Andrew S. Patrick
Jennifer Sobey
Tara Whalen
2009
conf/ccs
Multiple password interference in text passwords and click-based graphical passwords.
Sonia Chiasson
Alain Forget
Elizabeth Stobert
Paul C. van Oorschot
Robert Biddle
2008
conf/soups
Improving text passwords through persuasion.
Alain Forget
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
2008
conf/esorics
Exploring User Reactions to New Browser Cues for Extended Validation Certificates.
Jennifer Sobey
Robert Biddle
Paul C. van Oorschot
Andrew S. Patrick
2007
conf/soups
Helping users create better passwords: is this the right approach?
Alain Forget
Sonia Chiasson
Robert Biddle
2007
conf/soups
A second look at the usability of click-based graphical passwords.
Sonia Chiasson
Robert Biddle
Paul C. van Oorschot
2007
conf/esorics
Graphical Password Authentication Using Cued Click Points.
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
2006
conf/uss
A Usability Study and Critique of Two Password Managers.
Sonia Chiasson
Paul C. van Oorschot
Robert Biddle
Coauthors
Alain Forget
(6)
Andrew S. Patrick
(4)
Bill Chu
(1)
Bruna Freitas Machado
(1)
Chris Deschamps
(1)
Danielle M. Lottridge
(1)
Eddie Fuatimau
(1)
Elizabeth Stobert
(6)
Emerson R. Murphy-Hill
(1)
Eric Spero
(2)
Gerry Chan
(1)
Giovanni Russello
(1)
Heather Richter Lipford
(1)
Isa Seow
(1)
Jeff Wilson
(1)
Jennifer Sobey
(2)
Judith M. Brown
(1)
Lucas Betts
(1)
Max Hlywa
(2)
Mohammad Mannan
(1)
Nicholas Wright
(2)
Paul C. van Oorschot
(9)
Robert Biddle
(21)
Sonia Chiasson
(9)
Tara Whalen
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to