Follow
Scott Ruoti
Scott Ruoti
University of Tennessee
Verified email at ruoti.org - Homepage
Title
Cited by
Cited by
Year
Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes
S Ruoti, N Kim, B Burgon, T Van Der Horst, K Seamons
Proceedings of the Ninth Symposium on Usable Privacy and Security, 5, 2013
1432013
Why Johnny Still, Still Can’t Encrypt: Evaluating the Usability of a Modern PGP Client
S Ruoti, J Andersen, D Zappala, K Seamons
arXiv preprint arXiv:1510.08555, 2015
1222015
We’re on the Same Page: A Usability Study of Secure Email Using Pairs of Novice Users
S Ruoti, J Andersen, S Heidbrink, M O'Neill, E Vaziripour, J Wu, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1042016
A tale of two studies: The best and worst of yubikey usability
J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons
2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018
1032018
TLS proxies: Friend or foe?
M O'Neill, S Ruoti, K Seamons, D Zappala
Proceedings of the 2016 Internet Measurement Conference, 551-557, 2016
862016
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems
S Ruoti, B Roberts, K Seamons
Proceedings of the 24th International Conference on World Wide Web, 916-926, 2015
772015
Bolt: Data management for connected homes
T Gupta, RP Singh, A Phanishayee, J Jung, R Mahajan
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
712014
Blockchain Technology: What Is It Good For?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
582019
That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers
S Oesch, S Ruoti
Proceedings of the 29th USENIX Conference on Security Symposium, 2165-2182, 2020
562020
Weighing Context and Trade-Offs: How Suburban Adults Selected Their Online Security Posture
S Ruoti, T Monson, J Wu, D Zappala, K Seamons
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 211-228, 2017
552017
Private Webmail 2.0: Simple and Easy-to-Use Secure Email
S Ruoti, J Andersen, T Hendershot, D Zappala, K Seamons
Proceedings of the 29th Annual Symposium on User Interface Software and …, 2016
542016
A Comparative Usability Study of Key Management in Secure Email
S Ruoti, J Andersen, T Monson, D Zappala, K Seamons
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 375-394, 2018
382018
Johnny's journey toward usable secure email
S Ruoti, K Seamons
IEEE Security & Privacy 17 (6), 72-76, 2019
332019
TrustBase: An Architecture to Repair and Strengthen Certificate-Based Authentication
M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ...
26th USENIX Security Symposium (USENIX Security 17), 609-624, 2017
282017
MessageGuard: A Browser-Based Platform for Usable, Content-Based Encryption Research
S Ruoti, J Andersen, T Monson, D Zappala, K Seamons
arXiv preprint arXiv:1510.08943, 2015
25*2015
Strengthening Password-Based Authentication
S Ruoti, J Andersen, K Seamons
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
242016
A usability study of four secure email tools using paired participants
S Ruoti, J Andersen, L Dickinson, S Heidbrink, T Monson, M O'neill, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-33, 2019
232019
TLS inspection: how often and who cares?
M O'Neill, S Ruoti, K Seamons, D Zappala
IEEE Internet Computing 21 (3), 22-29, 2017
212017
SoK: Securing email—a stakeholder-based analysis
J Clark, PC van Oorschot, S Ruoti, K Seamons, D Zappala
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
202021
Private Facebook Chat
C Robison, S Ruoti, TW van der Horst, KE Seamons
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20