Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An empirical study of a decentralized identity wallet: Usability, security, and perspectives on user control
User-centric digital identity initiatives are emerging with a mission to shift control over online
identity disclosures to the individual. However, there is little representation of prospective …
identity disclosures to the individual. However, there is little representation of prospective …
Exploring {User-Suitable} metaphors for differentially private data analyses
Despite recent enhancements in the deployment of differential privacy (DP), little has been
done to address the human aspects of DP-enabled systems. Comprehending the complex …
done to address the human aspects of DP-enabled systems. Comprehending the complex …
Improving non-experts' understanding of end-to-end encryption: An exploratory study
End-to-end encryption (E2EE) can effectively protect the privacy of online communication
and has been adopted by several popular messaging apps. However, prior research …
and has been adopted by several popular messaging apps. However, prior research …
Security at the End of the Tunnel: The Anatomy of {VPN} Mental Models Among Experts and {Non-Experts} in a Corporate Context
With the worldwide COVID-19 pandemic in 2020 and 2021 necessitating working from
home, corporate Virtual Private Networks (VPNs) have become an important item securing …
home, corporate Virtual Private Networks (VPNs) have become an important item securing …
Examining the impact of provenance-enabled media on trust and accuracy perceptions
KJK Feng, N Ritchie, P Blumenthal, A Parsons… - Proceedings of the …, 2023 - dl.acm.org
In recent years, industry leaders and researchers have proposed to use technical
provenance standards to address visual misinformation spread through digitally altered …
provenance standards to address visual misinformation spread through digitally altered …
Exploring user mental models of {End-to-End} encrypted communication tools
End-to-end (E2E) encrypted communication tools can help users keep their communications
secure from government or corporate surveillance. In this work, we conduct a quantitative …
secure from government or corporate surveillance. In this work, we conduct a quantitative …
On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …
Models matter: Setting accurate privacy expectations for local and central differential privacy
Differential privacy is a popular privacy-enhancing technology that has been deployed both
in industry and government agencies. Unfortunately, existing explanations of differential …
in industry and government agencies. Unfortunately, existing explanations of differential …
Investigating security folklore: A case study on the tor over vpn phenomenon
Users face security folklore in their daily lives in the form of security advice, myths, and word-
of-mouth stories. Using a VPN to access the Tor network, ie, Tor over VPN, is an interesting …
of-mouth stories. Using a VPN to access the Tor network, ie, Tor over VPN, is an interesting …
Evaluating {In-Workflow} messages for improving mental models of {End-to-End} encryption
As large messaging providers increasingly adopt end-to-end encryption, private
communication is readily available to more users than ever before. However …
communication is readily available to more users than ever before. However …