Follow
Scott Ruoti
Scott Ruoti
University of Tennessee
Verified email at ruoti.org - Homepage
Title
Cited by
Cited by
Year
Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes
S Ruoti, N Kim, B Burgon, T Van Der Horst, K Seamons
Proceedings of the Ninth Symposium on Usable Privacy and Security, 5, 2013
1492013
Why Johnny Still, Still Can’t Encrypt: Evaluating the Usability of a Modern PGP Client
S Ruoti, J Andersen, D Zappala, K Seamons
arXiv preprint arXiv:1510.08555, 2015
1372015
A tale of two studies: The best and worst of yubikey usability
J Reynolds, T Smith, K Reese, L Dickinson, S Ruoti, K Seamons
2018 IEEE Symposium on Security and Privacy (SP), 872-888, 2018
1142018
We’re on the Same Page: A Usability Study of Secure Email Using Pairs of Novice Users
S Ruoti, J Andersen, S Heidbrink, M O'Neill, E Vaziripour, J Wu, ...
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1122016
TLS proxies: Friend or foe?
M O'Neill, S Ruoti, K Seamons, D Zappala
Proceedings of the 2016 Internet Measurement Conference, 551-557, 2016
952016
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems
S Ruoti, B Roberts, K Seamons
Proceedings of the 24th International Conference on World Wide Web, 916-926, 2015
822015
That was then, this is now: A security evaluation of password generation, storage, and autofill in browser-based password managers
S Oesch, S Ruoti
Proceedings of the 29th USENIX Conference on Security Symposium, 2165-2182, 2020
812020
Bolt: Data management for connected homes
T Gupta, RP Singh, A Phanishayee, J Jung, R Mahajan
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
742014
Blockchain Technology: What Is It Good For?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
712019
Weighing Context and Trade-Offs: How Suburban Adults Selected Their Online Security Posture
S Ruoti, T Monson, J Wu, D Zappala, K Seamons
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 211-228, 2017
622017
Private Webmail 2.0: Simple and Easy-to-Use Secure Email
S Ruoti, J Andersen, T Hendershot, D Zappala, K Seamons
Proceedings of the 29th Annual Symposium on User Interface Software and …, 2016
572016
A Comparative Usability Study of Key Management in Secure Email
S Ruoti, J Andersen, T Monson, D Zappala, K Seamons
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 375-394, 2018
412018
Johnny's journey toward usable secure email
S Ruoti, K Seamons
IEEE Security & Privacy 17 (6), 72-76, 2019
382019
TrustBase: An Architecture to Repair and Strengthen Certificate-Based Authentication
M O'Neill, S Heidbrink, S Ruoti, J Whitehead, D Bunker, L Dickinson, ...
26th USENIX Security Symposium (USENIX Security 17), 609-624, 2017
332017
Strengthening Password-Based Authentication
S Ruoti, J Andersen, K Seamons
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
282016
“It Basically Started Using Me:” An Observational Study of Password Manager Usage
S Oesch, S Ruoti, J Simmons, A Gautam
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
262022
A usability study of four secure email tools using paired participants
S Ruoti, J Andersen, L Dickinson, S Heidbrink, T Monson, M O'neill, ...
ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-33, 2019
262019
MessageGuard: A Browser-Based Platform for Usable, Content-Based Encryption Research
S Ruoti, J Andersen, T Monson, D Zappala, K Seamons
arXiv preprint arXiv:1510.08943, 2015
26*2015
SoK: Securing email—a stakeholder-based analysis
J Clark, PC van Oorschot, S Ruoti, K Seamons, D Zappala
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
222021
TLS inspection: how often and who cares?
M O'Neill, S Ruoti, K Seamons, D Zappala
IEEE Internet Computing 21 (3), 22-29, 2017
222017
The system can't perform the operation now. Try again later.
Articles 1–20