What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ruba Abu-Salma
Google Scholar
11
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/popets
Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities.
Yixin Zou
Kaiwen Sun
Tanisha Afnan
Ruba Abu-Salma
Robin Brewer
Florian Schaub
2024
journals/popets
"My Best Friend's Husband Sees and Knows Everything": A Cross-Contextual and Cross-Country Approach to Understanding Smart Home Privacy.
Tess Despres
Marcelino Ayala Constantino
Naomi Zacarias Lizola
Gerardo Sánchez Romero
Shijing He
Xiao Zhan
Noura Abdi
Ruba Abu-Salma
Jose Such
Julia Bernd
2022
conf/uss
"They Look at Vulnerability and Use That to Abuse You": Participatory Threat Modelling with Migrant Domestic Workers.
Julia Slupska
Selina Y. Cho
Marissa Begonia
Ruba Abu-Salma
Nayanatara Prakash
Mallika Balakrishnan
2022
conf/soups
Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras Reflect and Affect Relationships.
Julia Bernd
Ruba Abu-Salma
Junghyun Choy
Alisa Frik
2020
conf/uss
Bystanders' Privacy: The Perspectives of Nannies on Smart Home Surveillance.
Julia Bernd
Ruba Abu-Salma
Alisa Frik
2020
conf/soups
Innovation Inaction or In Action? The Role of User Experience in the Security and Privacy Design of Smart Home Cameras.
George Chalhoub
Ivan Flechais
Norbert Nthala
Ruba Abu-Salma
2020
conf/acsac
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Sean Oesch
Ruba Abu-Salma
Oumar Diallo
Juliane Krämer
James Simmons
Justin Wu
Scott Ruoti
2018
conf/uss
Exploring User Mental Models of End-to-End Encrypted Communication Tools.
Ruba Abu-Salma
Elissa M. Redmiles
Blase Ur
Miranda Wei
2017
conf/sp
Obstacles to the Adoption of Secure Communication Tools.
Ruba Abu-Salma
M. Angela Sasse
Joseph Bonneau
Anastasia Danilova
Alena Naiakshina
Matthew Smith
2016
conf/fc
Are Payment Card Contracts Unfair? (Short Paper).
Steven J. Murdoch
Ingolf Becker
Ruba Abu-Salma
Ross J. Anderson
Nicholas Bohm
Alice Hutchings
M. Angela Sasse
Gianluca Stringhini
2015
conf/ccs
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Ruba Abu-Salma
M. Angela Sasse
Joseph Bonneau
Matthew Smith
Coauthors
Alena Naiakshina
(1)
Alice Hutchings
(1)
Alisa Frik
(2)
Anastasia Danilova
(1)
Blase Ur
(1)
Elissa M. Redmiles
(1)
Florian Schaub
(1)
George Chalhoub
(1)
Gerardo Sánchez Romero
(1)
Gianluca Stringhini
(1)
Ingolf Becker
(1)
Ivan Flechais
(1)
James Simmons
(1)
Jose Such
(1)
Joseph Bonneau
(2)
Julia Bernd
(3)
Julia Slupska
(1)
Juliane Krämer
(1)
Junghyun Choy
(1)
Justin Wu
(1)
Kaiwen Sun
(1)
M. Angela Sasse
(3)
Mallika Balakrishnan
(1)
Marcelino Ayala Constantino
(1)
Marissa Begonia
(1)
Matthew Smith
(2)
Miranda Wei
(1)
Naomi Zacarias Lizola
(1)
Nayanatara Prakash
(1)
Nicholas Bohm
(1)
Norbert Nthala
(1)
Noura Abdi
(1)
Oumar Diallo
(1)
Robin Brewer
(1)
Ross J. Anderson
(1)
Ruba Abu-Salma
(11)
Scott Ruoti
(1)
Sean Oesch
(1)
Selina Y. Cho
(1)
Shijing He
(1)
Steven J. Murdoch
(1)
Tanisha Afnan
(1)
Tess Despres
(1)
Xiao Zhan
(1)
Yixin Zou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to