[{"title":"Vision: Towards True User-Centric Design for Digital Identity Wallets","conference":{"name":"Symposium on Usable Security and Privacy (USEC) 2025","location":"San Diego, U.S.A."},"main_file_link":[{"url":"https://www.ndss-symposium.org/wp-content/uploads/usec25-1.pdf","open_access":"1"}],"date_updated":"2025-03-15T09:08:45Z","oa":"1","date_created":"2025-03-14T23:12:43Z","author":[{"last_name":"Last","orcid":"0009-0008-9529-2427","id":"100966","full_name":"Last, Yorick","first_name":"Yorick"},{"id":"92804","full_name":"Arias Cabarcos, Patricia","last_name":"Arias Cabarcos","first_name":"Patricia"}],"year":"2025","citation":{"chicago":"Last, Yorick, and Patricia Arias Cabarcos. “Vision: Towards True User-Centric Design for Digital Identity Wallets.” In <i>Symposium on Usable Security and Privacy (USEC) 2025</i>, 2025.","ieee":"Y. Last and P. Arias Cabarcos, “Vision: Towards True User-Centric Design for Digital Identity Wallets,” presented at the Symposium on Usable Security and Privacy (USEC) 2025, San Diego, U.S.A., 2025.","ama":"Last Y, Arias Cabarcos P. Vision: Towards True User-Centric Design for Digital Identity Wallets. In: <i>Symposium on Usable Security and Privacy (USEC) 2025</i>. ; 2025.","apa":"Last, Y., &#38; Arias Cabarcos, P. (2025). Vision: Towards True User-Centric Design for Digital Identity Wallets. <i>Symposium on Usable Security and Privacy (USEC) 2025</i>. Symposium on Usable Security and Privacy (USEC) 2025, San Diego, U.S.A.","mla":"Last, Yorick, and Patricia Arias Cabarcos. “Vision: Towards True User-Centric Design for Digital Identity Wallets.” <i>Symposium on Usable Security and Privacy (USEC) 2025</i>, 2025.","short":"Y. Last, P. Arias Cabarcos, in: Symposium on Usable Security and Privacy (USEC) 2025, 2025.","bibtex":"@inproceedings{Last_Arias Cabarcos_2025, title={Vision: Towards True User-Centric Design for Digital Identity Wallets}, booktitle={Symposium on Usable Security and Privacy (USEC) 2025}, author={Last, Yorick and Arias Cabarcos, Patricia}, year={2025} }"},"publication_identifier":{"isbn":["979-8-9919276-5-9"]},"language":[{"iso":"eng"}],"_id":"59019","department":[{"_id":"679"}],"user_id":"100966","abstract":[{"lang":"eng","text":"To facilitate the growing demand for a universal means of digital identification across services, while preserving user control and privacy, multiple digital identity implementations have emerged. From a technical perspective, many of these rely on established concepts within cryptography, allowing them to provide benefits in terms of security and privacy. Recent legislation also promises broader recognition and acceptance of digital identities, both in the digital world and beyond. However, research into the usability, accessibility, and user understanding of digital identities is rare. We argue that the development of usable digital identity wallets is vital to the successful and inclusive application of digital identities in society. In this vision paper, we describe our research plans for obtaining a better understanding of how to develop these usable digital identities wallets."}],"status":"public","publication":"Symposium on Usable Security and Privacy (USEC) 2025","type":"conference"},{"status":"public","type":"conference","publication":"34th USENIX Security Symposium (USENIX Security 25)","language":[{"iso":"eng"}],"_id":"61144","user_id":"46433","department":[{"_id":"679"}],"year":"2025","citation":{"short":"E. Kablo, M. Kleber, P. Arias Cabarcos, in: 34th USENIX Security Symposium (USENIX Security 25), 2025, pp. 1531–1548.","bibtex":"@inproceedings{Kablo_Kleber_Arias Cabarcos_2025, title={PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity}, booktitle={34th USENIX Security Symposium (USENIX Security 25)}, author={Kablo, Emiram and Kleber, Melina and Arias Cabarcos, Patricia}, year={2025}, pages={1531–1548} }","mla":"Kablo, Emiram, et al. “PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity.” <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 2025, pp. 1531–1548.","apa":"Kablo, E., Kleber, M., &#38; Arias Cabarcos, P. (2025). PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity. <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 1531–1548.","ama":"Kablo E, Kleber M, Arias Cabarcos P. PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity. In: <i>34th USENIX Security Symposium (USENIX Security 25)</i>. ; 2025:1531–1548.","ieee":"E. Kablo, M. Kleber, and P. Arias Cabarcos, “PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity,” in <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 2025, pp. 1531–1548.","chicago":"Kablo, Emiram, Melina Kleber, and Patricia Arias Cabarcos. “PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity.” In <i>34th USENIX Security Symposium (USENIX Security 25)</i>, 1531–1548, 2025."},"page":"1531–1548","title":"PrivaCI in VR: Exploring Perceptions and Acceptability of Data Sharing in Virtual Reality Through Contextual Integrity","main_file_link":[{"url":"https://www.usenix.org/conference/usenixsecurity25/presentation/kablo","open_access":"1"}],"date_updated":"2025-09-08T08:48:37Z","oa":"1","author":[{"last_name":"Kablo","full_name":"Kablo, Emiram","id":"46433","first_name":"Emiram"},{"first_name":"Melina","full_name":"Kleber, Melina","last_name":"Kleber"},{"first_name":"Patricia","full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos"}],"date_created":"2025-09-08T08:45:30Z"},{"file":[{"content_type":"application/pdf","relation":"main_file","creator":"ekablo","date_created":"2025-04-01T13:54:35Z","date_updated":"2025-04-01T13:57:20Z","file_name":"CredentialAudits_RIS.pdf","access_level":"open_access","file_id":"59230","file_size":1029688}],"status":"public","type":"conference","publication":"Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","ddc":["000"],"file_date_updated":"2025-04-01T13:57:20Z","language":[{"iso":"eng"}],"_id":"54291","user_id":"46433","department":[{"_id":"679"}],"year":"2024","citation":{"ieee":"E. Kablo, K. Kader, and P. Arias Cabarcos, “‘I’m actually going to go and change these passwords’: Analyzing the Usability of Credential Audit Interfaces in Password Managers,” 2024, doi: <a href=\"https://doi.org/10.1145/3613905.3650889\">10.1145/3613905.3650889</a>.","chicago":"Kablo, Emiram, Katharina Kader, and Patricia Arias Cabarcos. “‘I’m Actually Going to Go and Change These Passwords’: Analyzing the Usability of Credential Audit Interfaces in Password Managers.” In <i>Extended Abstracts of the CHI Conference on Human Factors in Computing Systems</i>. ACM, 2024. <a href=\"https://doi.org/10.1145/3613905.3650889\">https://doi.org/10.1145/3613905.3650889</a>.","ama":"Kablo E, Kader K, Arias Cabarcos P. “I’m actually going to go and change these passwords”: Analyzing the Usability of Credential Audit Interfaces in Password Managers. In: <i>Extended Abstracts of the CHI Conference on Human Factors in Computing Systems</i>. ACM; 2024. doi:<a href=\"https://doi.org/10.1145/3613905.3650889\">10.1145/3613905.3650889</a>","apa":"Kablo, E., Kader, K., &#38; Arias Cabarcos, P. (2024). “I’m actually going to go and change these passwords”: Analyzing the Usability of Credential Audit Interfaces in Password Managers. <i>Extended Abstracts of the CHI Conference on Human Factors in Computing Systems</i>. <a href=\"https://doi.org/10.1145/3613905.3650889\">https://doi.org/10.1145/3613905.3650889</a>","mla":"Kablo, Emiram, et al. “‘I’m Actually Going to Go and Change These Passwords’: Analyzing the Usability of Credential Audit Interfaces in Password Managers.” <i>Extended Abstracts of the CHI Conference on Human Factors in Computing Systems</i>, ACM, 2024, doi:<a href=\"https://doi.org/10.1145/3613905.3650889\">10.1145/3613905.3650889</a>.","bibtex":"@inproceedings{Kablo_Kader_Arias Cabarcos_2024, title={“I’m actually going to go and change these passwords”: Analyzing the Usability of Credential Audit Interfaces in Password Managers}, DOI={<a href=\"https://doi.org/10.1145/3613905.3650889\">10.1145/3613905.3650889</a>}, booktitle={Extended Abstracts of the CHI Conference on Human Factors in Computing Systems}, publisher={ACM}, author={Kablo, Emiram and Kader, Katharina and Arias Cabarcos, Patricia}, year={2024} }","short":"E. Kablo, K. Kader, P. Arias Cabarcos, in: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, ACM, 2024."},"publication_status":"published","has_accepted_license":"1","title":"\"I'm actually going to go and change these passwords\": Analyzing the Usability of Credential Audit Interfaces in Password Managers","doi":"10.1145/3613905.3650889","oa":"1","publisher":"ACM","date_updated":"2025-04-01T13:57:21Z","author":[{"last_name":"Kablo","full_name":"Kablo, Emiram","id":"46433","first_name":"Emiram"},{"first_name":"Katharina","full_name":"Kader, Katharina","last_name":"Kader"},{"last_name":"Arias Cabarcos","id":"92804","full_name":"Arias Cabarcos, Patricia","first_name":"Patricia"}],"date_created":"2024-05-14T21:13:26Z"},{"department":[{"_id":"679"}],"user_id":"46433","_id":"49373","language":[{"iso":"eng"}],"publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","status":"public","date_created":"2023-12-02T14:50:07Z","author":[{"first_name":"Emiram","full_name":"Kablo, Emiram","id":"46433","last_name":"Kablo"},{"first_name":"Patricia","last_name":"Arias Cabarcos","id":"92804","full_name":"Arias Cabarcos, Patricia"}],"date_updated":"2023-12-02T14:52:48Z","publisher":"ACM","doi":"10.1145/3576915.3623164","title":"Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use","publication_status":"published","citation":{"ieee":"E. Kablo and P. Arias Cabarcos, “Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use,” 2023, doi: <a href=\"https://doi.org/10.1145/3576915.3623164\">10.1145/3576915.3623164</a>.","chicago":"Kablo, Emiram, and Patricia Arias Cabarcos. “Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3623164\">https://doi.org/10.1145/3576915.3623164</a>.","ama":"Kablo E, Arias Cabarcos P. Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. In: <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2023. doi:<a href=\"https://doi.org/10.1145/3576915.3623164\">10.1145/3576915.3623164</a>","apa":"Kablo, E., &#38; Arias Cabarcos, P. (2023). Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3576915.3623164\">https://doi.org/10.1145/3576915.3623164</a>","short":"E. Kablo, P. Arias Cabarcos, in: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2023.","mla":"Kablo, Emiram, and Patricia Arias Cabarcos. “Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2023, doi:<a href=\"https://doi.org/10.1145/3576915.3623164\">10.1145/3576915.3623164</a>.","bibtex":"@inproceedings{Kablo_Arias Cabarcos_2023, title={Privacy in the Age of Neurotechnology: Investigating Public Attitudes towards Brain Data Collection and Use}, DOI={<a href=\"https://doi.org/10.1145/3576915.3623164\">10.1145/3576915.3623164</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Kablo, Emiram and Arias Cabarcos, Patricia}, year={2023} }"},"year":"2023"},{"status":"public","publication":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","type":"conference","language":[{"iso":"eng"}],"user_id":"92804","_id":"49641","citation":{"ama":"Fallahi M, Arias Cabarcos P, Strufe T. Poster: Towards Practical Brainwave-based User Authentication. In: <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM; 2023. doi:<a href=\"https://doi.org/10.1145/3576915.3624399\">10.1145/3576915.3624399</a>","chicago":"Fallahi, Matin, Patricia Arias Cabarcos, and Thorsten Strufe. “Poster: Towards Practical Brainwave-Based User Authentication.” In <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>. ACM, 2023. <a href=\"https://doi.org/10.1145/3576915.3624399\">https://doi.org/10.1145/3576915.3624399</a>.","ieee":"M. Fallahi, P. Arias Cabarcos, and T. Strufe, “Poster: Towards Practical Brainwave-based User Authentication,” 2023, doi: <a href=\"https://doi.org/10.1145/3576915.3624399\">10.1145/3576915.3624399</a>.","short":"M. Fallahi, P. Arias Cabarcos, T. Strufe, in: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, ACM, 2023.","mla":"Fallahi, Matin, et al. “Poster: Towards Practical Brainwave-Based User Authentication.” <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>, ACM, 2023, doi:<a href=\"https://doi.org/10.1145/3576915.3624399\">10.1145/3576915.3624399</a>.","bibtex":"@inproceedings{Fallahi_Arias Cabarcos_Strufe_2023, title={Poster: Towards Practical Brainwave-based User Authentication}, DOI={<a href=\"https://doi.org/10.1145/3576915.3624399\">10.1145/3576915.3624399</a>}, booktitle={Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security}, publisher={ACM}, author={Fallahi, Matin and Arias Cabarcos, Patricia and Strufe, Thorsten}, year={2023} }","apa":"Fallahi, M., Arias Cabarcos, P., &#38; Strufe, T. (2023). Poster: Towards Practical Brainwave-based User Authentication. <i>Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security</i>. <a href=\"https://doi.org/10.1145/3576915.3624399\">https://doi.org/10.1145/3576915.3624399</a>"},"year":"2023","publication_status":"published","doi":"10.1145/3576915.3624399","title":"Poster: Towards Practical Brainwave-based User Authentication","author":[{"first_name":"Matin","full_name":"Fallahi, Matin","last_name":"Fallahi"},{"last_name":"Arias Cabarcos","id":"92804","full_name":"Arias Cabarcos, Patricia","first_name":"Patricia"},{"full_name":"Strufe, Thorsten","last_name":"Strufe","first_name":"Thorsten"}],"date_created":"2023-12-14T16:51:11Z","publisher":"ACM","date_updated":"2023-12-14T16:52:42Z"},{"intvolume":"       132","citation":{"apa":"Robles-González, A., Arias Cabarcos, P., &#38; Parra-Arnau, J. (2023). Privacy-centered authentication: A new framework and analysis. <i>Computers &#38;amp; Security</i>, <i>132</i>, Article 103353. <a href=\"https://doi.org/10.1016/j.cose.2023.103353\">https://doi.org/10.1016/j.cose.2023.103353</a>","short":"A. Robles-González, P. Arias Cabarcos, J. Parra-Arnau, Computers &#38;amp; Security 132 (2023).","mla":"Robles-González, Antonio, et al. “Privacy-Centered Authentication: A New Framework and Analysis.” <i>Computers &#38;amp; Security</i>, vol. 132, 103353, Elsevier BV, 2023, doi:<a href=\"https://doi.org/10.1016/j.cose.2023.103353\">10.1016/j.cose.2023.103353</a>.","bibtex":"@article{Robles-González_Arias Cabarcos_Parra-Arnau_2023, title={Privacy-centered authentication: A new framework and analysis}, volume={132}, DOI={<a href=\"https://doi.org/10.1016/j.cose.2023.103353\">10.1016/j.cose.2023.103353</a>}, number={103353}, journal={Computers &#38;amp; Security}, publisher={Elsevier BV}, author={Robles-González, Antonio and Arias Cabarcos, Patricia and Parra-Arnau, Javier}, year={2023} }","ama":"Robles-González A, Arias Cabarcos P, Parra-Arnau J. Privacy-centered authentication: A new framework and analysis. <i>Computers &#38;amp; Security</i>. 2023;132. doi:<a href=\"https://doi.org/10.1016/j.cose.2023.103353\">10.1016/j.cose.2023.103353</a>","chicago":"Robles-González, Antonio, Patricia Arias Cabarcos, and Javier Parra-Arnau. “Privacy-Centered Authentication: A New Framework and Analysis.” <i>Computers &#38;amp; Security</i> 132 (2023). <a href=\"https://doi.org/10.1016/j.cose.2023.103353\">https://doi.org/10.1016/j.cose.2023.103353</a>.","ieee":"A. Robles-González, P. Arias Cabarcos, and J. Parra-Arnau, “Privacy-centered authentication: A new framework and analysis,” <i>Computers &#38;amp; Security</i>, vol. 132, Art. no. 103353, 2023, doi: <a href=\"https://doi.org/10.1016/j.cose.2023.103353\">10.1016/j.cose.2023.103353</a>."},"year":"2023","publication_identifier":{"issn":["0167-4048"]},"publication_status":"published","doi":"10.1016/j.cose.2023.103353","title":"Privacy-centered authentication: A new framework and analysis","volume":132,"date_created":"2024-04-17T13:17:58Z","author":[{"last_name":"Robles-González","full_name":"Robles-González, Antonio","first_name":"Antonio"},{"id":"92804","full_name":"Arias Cabarcos, Patricia","last_name":"Arias Cabarcos","first_name":"Patricia"},{"full_name":"Parra-Arnau, Javier","last_name":"Parra-Arnau","first_name":"Javier"}],"publisher":"Elsevier BV","date_updated":"2024-04-17T13:18:31Z","status":"public","publication":"Computers &amp; Security","type":"journal_article","language":[{"iso":"eng"}],"keyword":["Law","General Computer Science"],"article_number":"103353","user_id":"92804","_id":"53541"},{"citation":{"ama":"Röse M, Kablo E, Arias Cabarcos P. Overcoming Theory: Designing Brainwave Authentication for the Real World. In: <i>Proceedings of the 2023 European Symposium on Usable Security</i>. ACM; 2023. doi:<a href=\"https://doi.org/10.1145/3617072.3617120\">10.1145/3617072.3617120</a>","ieee":"M. Röse, E. Kablo, and P. Arias Cabarcos, “Overcoming Theory: Designing Brainwave Authentication for the Real World,” 2023, doi: <a href=\"https://doi.org/10.1145/3617072.3617120\">10.1145/3617072.3617120</a>.","chicago":"Röse, Markus, Emiram Kablo, and Patricia Arias Cabarcos. “Overcoming Theory: Designing Brainwave Authentication for the Real World.” In <i>Proceedings of the 2023 European Symposium on Usable Security</i>. ACM, 2023. <a href=\"https://doi.org/10.1145/3617072.3617120\">https://doi.org/10.1145/3617072.3617120</a>.","bibtex":"@inproceedings{Röse_Kablo_Arias Cabarcos_2023, title={Overcoming Theory: Designing Brainwave Authentication for the Real World}, DOI={<a href=\"https://doi.org/10.1145/3617072.3617120\">10.1145/3617072.3617120</a>}, booktitle={Proceedings of the 2023 European Symposium on Usable Security}, publisher={ACM}, author={Röse, Markus and Kablo, Emiram and Arias Cabarcos, Patricia}, year={2023} }","mla":"Röse, Markus, et al. “Overcoming Theory: Designing Brainwave Authentication for the Real World.” <i>Proceedings of the 2023 European Symposium on Usable Security</i>, ACM, 2023, doi:<a href=\"https://doi.org/10.1145/3617072.3617120\">10.1145/3617072.3617120</a>.","short":"M. Röse, E. Kablo, P. Arias Cabarcos, in: Proceedings of the 2023 European Symposium on Usable Security, ACM, 2023.","apa":"Röse, M., Kablo, E., &#38; Arias Cabarcos, P. (2023). Overcoming Theory: Designing Brainwave Authentication for the Real World. <i>Proceedings of the 2023 European Symposium on Usable Security</i>. <a href=\"https://doi.org/10.1145/3617072.3617120\">https://doi.org/10.1145/3617072.3617120</a>"},"year":"2023","publication_status":"published","doi":"10.1145/3617072.3617120","title":"Overcoming Theory: Designing Brainwave Authentication for the Real World","author":[{"last_name":"Röse","full_name":"Röse, Markus","first_name":"Markus"},{"first_name":"Emiram","last_name":"Kablo","full_name":"Kablo, Emiram","id":"46433"},{"first_name":"Patricia","last_name":"Arias Cabarcos","full_name":"Arias Cabarcos, Patricia","id":"92804"}],"date_created":"2023-10-14T12:09:25Z","date_updated":"2024-04-17T13:16:26Z","publisher":"ACM","status":"public","type":"conference","publication":"Proceedings of the 2023 European Symposium on Usable Security","language":[{"iso":"eng"}],"user_id":"92804","_id":"48060"},{"title":"Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth","date_created":"2023-08-15T12:21:05Z","publisher":"IEEE","year":"2023","quality_controlled":"1","language":[{"iso":"eng"}],"keyword":["Defense-in-Depth","Human Factors","Production Engineering","Product Design","Systems Engineering"],"ddc":["000"],"file":[{"relation":"main_file","content_type":"application/pdf","access_level":"closed","file_id":"56077","file_name":"Re_envisioning_Industrial_Control_Systems_security.pdf","file_size":197727,"date_created":"2024-09-05T13:00:09Z","creator":"jrossel","date_updated":"2024-09-05T13:00:09Z"}],"abstract":[{"text":"The security of Industrial Control Systems is relevant both for reliable production system operations and for high-quality throughput in terms of manufactured products. Security measures are designed, operated and maintained by different roles along product and production system lifecycles. Defense-in-Depth as a paradigm builds upon the assumption that breaches are unavoidable. The paper at hand provides an analysis of roles, corresponding Human Factors and their relevance for data theft and sabotage attacks. The resulting taxonomy is reflected by an example related to Additive Manufacturing. The results assist in both designing and redesigning Industrial Control System as part of an entire production system so that Defense-in-Depth with regard to Human Factors is built in by design.","lang":"eng"}],"publication":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","conference":{"start_date":"2023-07-03","name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","location":"Delft, Netherlands","end_date":"2023-07-07"},"doi":"10.1109/eurospw59978.2023.00048","main_file_link":[{"url":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10190647"}],"author":[{"first_name":"Jens","last_name":"Pottebaum","orcid":"http://orcid.org/0000-0001-8778-2989","id":"405","full_name":"Pottebaum, Jens"},{"last_name":"Rossel","orcid":"0000-0002-3182-4059","full_name":"Rossel, Jost","id":"58331","first_name":"Jost"},{"first_name":"Juraj","last_name":"Somorovsky","orcid":"0000-0002-3593-7720","full_name":"Somorovsky, Juraj","id":"83504"},{"first_name":"Yasemin","full_name":"Acar, Yasemin","id":"94636","last_name":"Acar"},{"first_name":"René","full_name":"Fahr, René","id":"111","last_name":"Fahr"},{"last_name":"Arias Cabarcos","full_name":"Arias Cabarcos, Patricia","id":"92804","first_name":"Patricia"},{"full_name":"Bodden, Eric","id":"59256","orcid":"0000-0003-3470-3647","last_name":"Bodden","first_name":"Eric"},{"orcid":"0000-0001-5765-971X","last_name":"Gräßler","full_name":"Gräßler, Iris","id":"47565","first_name":"Iris"}],"date_updated":"2025-07-16T11:06:47Z","page":"379-385","citation":{"chicago":"Pottebaum, Jens, Jost Rossel, Juraj Somorovsky, Yasemin Acar, René Fahr, Patricia Arias Cabarcos, Eric Bodden, and Iris Gräßler. “Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.” In <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, 379–85. IEEE, 2023. <a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">https://doi.org/10.1109/eurospw59978.2023.00048</a>.","ieee":"J. Pottebaum <i>et al.</i>, “Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth,” in <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, Delft, Netherlands, 2023, pp. 379–385, doi: <a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>.","ama":"Pottebaum J, Rossel J, Somorovsky J, et al. Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. In: <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>. IEEE; 2023:379-385. doi:<a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>","short":"J. Pottebaum, J. Rossel, J. Somorovsky, Y. Acar, R. Fahr, P. Arias Cabarcos, E. Bodden, I. Gräßler, in: 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW), IEEE, 2023, pp. 379–385.","mla":"Pottebaum, Jens, et al. “Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth.” <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, IEEE, 2023, pp. 379–85, doi:<a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>.","bibtex":"@inproceedings{Pottebaum_Rossel_Somorovsky_Acar_Fahr_Arias Cabarcos_Bodden_Gräßler_2023, title={Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth}, DOI={<a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">10.1109/eurospw59978.2023.00048</a>}, booktitle={2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)}, publisher={IEEE}, author={Pottebaum, Jens and Rossel, Jost and Somorovsky, Juraj and Acar, Yasemin and Fahr, René and Arias Cabarcos, Patricia and Bodden, Eric and Gräßler, Iris}, year={2023}, pages={379–385} }","apa":"Pottebaum, J., Rossel, J., Somorovsky, J., Acar, Y., Fahr, R., Arias Cabarcos, P., Bodden, E., &#38; Gräßler, I. (2023). Re-Envisioning Industrial Control Systems Security by Considering Human Factors as a Core Element of Defense-in-Depth. <i>2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&#38;PW)</i>, 379–385. <a href=\"https://doi.org/10.1109/eurospw59978.2023.00048\">https://doi.org/10.1109/eurospw59978.2023.00048</a>"},"has_accepted_license":"1","publication_status":"published","file_date_updated":"2024-09-05T13:00:09Z","department":[{"_id":"34"},{"_id":"152"},{"_id":"76"},{"_id":"632"},{"_id":"858"}],"user_id":"58331","_id":"46500","status":"public","type":"conference"},{"citation":{"chicago":"Arias Cabarcos, Patricia, Saina Khalili, and Thorsten Strufe. “‘Surprised, Shocked, Worried’: User Reactions to Facebook Data  Collection from Third Parties.” <i>ArXiv:2209.08048</i>, 2022.","ieee":"P. Arias Cabarcos, S. Khalili, and T. Strufe, “‘Surprised, Shocked, Worried’: User Reactions to Facebook Data  Collection from Third Parties,” <i>arXiv:2209.08048</i>. 2022.","ama":"Arias Cabarcos P, Khalili S, Strufe T. “Surprised, Shocked, Worried”: User Reactions to Facebook Data  Collection from Third Parties. <i>arXiv:220908048</i>. Published online 2022.","apa":"Arias Cabarcos, P., Khalili, S., &#38; Strufe, T. (2022). “Surprised, Shocked, Worried”: User Reactions to Facebook Data  Collection from Third Parties. In <i>arXiv:2209.08048</i>.","short":"P. Arias Cabarcos, S. Khalili, T. Strufe, ArXiv:2209.08048 (2022).","mla":"Arias Cabarcos, Patricia, et al. “‘Surprised, Shocked, Worried’: User Reactions to Facebook Data  Collection from Third Parties.” <i>ArXiv:2209.08048</i>, 2022.","bibtex":"@article{Arias Cabarcos_Khalili_Strufe_2022, title={“Surprised, Shocked, Worried”: User Reactions to Facebook Data  Collection from Third Parties}, journal={arXiv:2209.08048}, author={Arias Cabarcos, Patricia and Khalili, Saina and Strufe, Thorsten}, year={2022} }"},"year":"2022","title":"'Surprised, Shocked, Worried': User Reactions to Facebook Data  Collection from Third Parties","author":[{"last_name":"Arias Cabarcos","full_name":"Arias Cabarcos, Patricia","id":"92804","first_name":"Patricia"},{"full_name":"Khalili, Saina","last_name":"Khalili","first_name":"Saina"},{"last_name":"Strufe","full_name":"Strufe, Thorsten","first_name":"Thorsten"}],"date_created":"2022-11-14T20:43:23Z","date_updated":"2023-10-14T12:07:44Z","status":"public","abstract":[{"text":"Data collection and aggregation by online services happens to an extent that\r\nis often beyond awareness and comprehension of its users. Transparency tools\r\nbecome crucial to inform people, though it is unclear how well they work. To\r\ninvestigate this matter, we conducted a user study focusing on Facebook, which\r\nhas recently released the \"Off-Facebook Activity\" transparency dashboard that\r\ninforms about personal data collection from third parties. We exposed a group\r\nof n = 100 participants to the dashboard and surveyed their level of awareness\r\nand reactions to understand how transparency impacts users' privacy attitudes\r\nand intended behavior. Our participants were surprised about the massive amount\r\nof collected data, became significantly less comfortable with data collection,\r\nand more likely to take protective measures. Collaterally, we observed that\r\ncurrent consent schemes are inadequate. Based on the survey findings, we make\r\nrecommendations for more usable transparency and highlight the need to raise\r\nawareness about transparency tools and to provide easily actionable privacy\r\ncontrols.","lang":"eng"}],"publication":"arXiv:2209.08048","type":"preprint","language":[{"iso":"eng"}],"user_id":"92804","external_id":{"arxiv":["2209.08048"]},"_id":"34079"},{"year":"2021","citation":{"mla":"Hanisch, Simon, et al. “Privacy-Protecting Techniques for Behavioral Data: A Survey.” <i>CoRR</i>, vol. abs/2109.04120, 2021.","bibtex":"@article{Hanisch_Arias Cabarcos_Parra-Arnau_Strufe_2021, title={Privacy-Protecting Techniques for Behavioral Data: A Survey}, volume={abs/2109.04120}, journal={CoRR}, author={Hanisch, Simon and Arias Cabarcos, Patricia and Parra-Arnau, Javier and Strufe, Thorsten}, year={2021} }","short":"S. Hanisch, P. Arias Cabarcos, J. Parra-Arnau, T. Strufe, CoRR abs/2109.04120 (2021).","apa":"Hanisch, S., Arias Cabarcos, P., Parra-Arnau, J., &#38; Strufe, T. (2021). Privacy-Protecting Techniques for Behavioral Data: A Survey. <i>CoRR</i>, <i>abs/2109.04120</i>.","ama":"Hanisch S, Arias Cabarcos P, Parra-Arnau J, Strufe T. Privacy-Protecting Techniques for Behavioral Data: A Survey. <i>CoRR</i>. 2021;abs/2109.04120.","chicago":"Hanisch, Simon, Patricia Arias Cabarcos, Javier Parra-Arnau, and Thorsten Strufe. “Privacy-Protecting Techniques for Behavioral Data: A Survey.” <i>CoRR</i> abs/2109.04120 (2021).","ieee":"S. Hanisch, P. Arias Cabarcos, J. Parra-Arnau, and T. Strufe, “Privacy-Protecting Techniques for Behavioral Data: A Survey,” <i>CoRR</i>, vol. abs/2109.04120, 2021."},"title":"Privacy-Protecting Techniques for Behavioral Data: A Survey","date_updated":"2022-01-27T17:02:27Z","author":[{"last_name":"Hanisch","full_name":"Hanisch, Simon","first_name":"Simon"},{"first_name":"Patricia","last_name":"Arias Cabarcos","full_name":"Arias Cabarcos, Patricia","id":"92804"},{"first_name":"Javier","last_name":"Parra-Arnau","full_name":"Parra-Arnau, Javier"},{"first_name":"Thorsten","last_name":"Strufe","full_name":"Strufe, Thorsten"}],"date_created":"2021-12-08T19:13:24Z","volume":"abs/2109.04120","status":"public","type":"journal_article","publication":"CoRR","language":[{"iso":"eng"}],"extern":"1","_id":"28463","user_id":"92804","department":[{"_id":"679"}]},{"title":"Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance","publisher":"{USENIX} Association","date_updated":"2022-01-27T17:09:45Z","date_created":"2021-12-08T19:13:22Z","author":[{"full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos","first_name":"Patricia"},{"first_name":"Thilo","last_name":"Habrich","full_name":"Habrich, Thilo"},{"first_name":"Karen","full_name":"Becker, Karen","last_name":"Becker"},{"full_name":"Becker, Christian","last_name":"Becker","first_name":"Christian"},{"last_name":"Strufe","full_name":"Strufe, Thorsten","first_name":"Thorsten"}],"year":"2021","citation":{"apa":"Arias Cabarcos, P., Habrich, T., Becker, K., Becker, C., &#38; Strufe, T. (2021). Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. In M. Bailey &#38; R. Greenstadt (Eds.), <i>30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021</i> (pp. 55–72). {USENIX} Association.","mla":"Arias Cabarcos, Patricia, et al. “Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance.” <i>30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, {USENIX} Association, 2021, pp. 55–72.","bibtex":"@inproceedings{Arias Cabarcos_Habrich_Becker_Becker_Strufe_2021, title={Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance}, booktitle={30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, publisher={{USENIX} Association}, author={Arias Cabarcos, Patricia and Habrich, Thilo and Becker, Karen and Becker, Christian and Strufe, Thorsten}, editor={Bailey, Michael and Greenstadt, Rachel}, year={2021}, pages={55–72} }","short":"P. Arias Cabarcos, T. Habrich, K. Becker, C. Becker, T. Strufe, in: M. Bailey, R. Greenstadt (Eds.), 30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021, {USENIX} Association, 2021, pp. 55–72.","ieee":"P. Arias Cabarcos, T. Habrich, K. Becker, C. Becker, and T. Strufe, “Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance,” in <i>30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021</i>, 2021, pp. 55–72.","chicago":"Arias Cabarcos, Patricia, Thilo Habrich, Karen Becker, Christian Becker, and Thorsten Strufe. “Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance.” In <i>30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021</i>, edited by Michael Bailey and Rachel Greenstadt, 55–72. {USENIX} Association, 2021.","ama":"Arias Cabarcos P, Habrich T, Becker K, Becker C, Strufe T. Inexpensive Brainwave Authentication: New Techniques and Insights on User Acceptance. In: Bailey M, Greenstadt R, eds. <i>30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021</i>. {USENIX} Association; 2021:55-72."},"page":"55-72","extern":"1","language":[{"iso":"eng"}],"_id":"28462","user_id":"92804","department":[{"_id":"679"}],"editor":[{"full_name":"Bailey, Michael","last_name":"Bailey","first_name":"Michael"},{"full_name":"Greenstadt, Rachel","last_name":"Greenstadt","first_name":"Rachel"}],"status":"public","type":"conference","publication":"30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021"},{"extern":"1","language":[{"iso":"eng"}],"user_id":"92804","_id":"28464","status":"public","type":"journal_article","publication":"{IEEE} Access","doi":"10.1109/ACCESS.2020.2987483","title":"INRISCO: INcident monitoRing in Smart COmmunities","date_created":"2021-12-08T19:13:25Z","author":[{"last_name":"Aguilar'Igartua","full_name":"Aguilar'Igartua, Mónica","first_name":"Mónica"},{"first_name":"Florina","last_name":"Almenárez-Mendoza","full_name":"Almenárez-Mendoza, Florina"},{"last_name":"P. Díaz Redondo","full_name":"P. Díaz Redondo, Rebeca","first_name":"Rebeca"},{"last_name":"I. Martín'Vicente","full_name":"I. Martín'Vicente, Manuela","first_name":"Manuela"},{"first_name":"Jordi","full_name":"Forné, Jordi","last_name":"Forné"},{"last_name":"Campo","full_name":"Campo, Celeste","first_name":"Celeste"},{"first_name":"Ana","last_name":"Fernández Vilas","full_name":"Fernández Vilas, Ana"},{"first_name":"Luis","full_name":"J. de la Cruz Llopis, Luis","last_name":"J. de la Cruz Llopis"},{"full_name":"García-Rubio, Carlos","last_name":"García-Rubio","first_name":"Carlos"},{"full_name":"Marín-López, Andrés","last_name":"Marín-López","first_name":"Andrés"},{"full_name":"Mohamad Mezher, Ahmad","last_name":"Mohamad Mezher","first_name":"Ahmad"},{"last_name":"Díaz Sánchez","full_name":"Díaz Sánchez, Daniel","first_name":"Daniel"},{"first_name":"Héctor","last_name":"Cerezo-Costas","full_name":"Cerezo-Costas, Héctor"},{"full_name":"Rebollo-Monedero, David","last_name":"Rebollo-Monedero","first_name":"David"},{"full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos","first_name":"Patricia"},{"full_name":"Rico-Novella, Francisco","last_name":"Rico-Novella","first_name":"Francisco"}],"volume":8,"date_updated":"2022-01-27T16:54:19Z","citation":{"ieee":"M. Aguilar’Igartua <i>et al.</i>, “INRISCO: INcident monitoRing in Smart COmmunities,” <i>{IEEE} Access</i>, vol. 8, pp. 72435–72460, 2020, doi: <a href=\"https://doi.org/10.1109/ACCESS.2020.2987483\">10.1109/ACCESS.2020.2987483</a>.","chicago":"Aguilar’Igartua, Mónica, Florina Almenárez-Mendoza, Rebeca P. Díaz Redondo, Manuela I. Martín’Vicente, Jordi Forné, Celeste Campo, Ana Fernández Vilas, et al. “INRISCO: INcident MonitoRing in Smart COmmunities.” <i>{IEEE} Access</i> 8 (2020): 72435–60. <a href=\"https://doi.org/10.1109/ACCESS.2020.2987483\">https://doi.org/10.1109/ACCESS.2020.2987483</a>.","ama":"Aguilar’Igartua M, Almenárez-Mendoza F, P. Díaz Redondo R, et al. INRISCO: INcident monitoRing in Smart COmmunities. <i>{IEEE} Access</i>. 2020;8:72435-72460. doi:<a href=\"https://doi.org/10.1109/ACCESS.2020.2987483\">10.1109/ACCESS.2020.2987483</a>","short":"M. Aguilar’Igartua, F. Almenárez-Mendoza, R. P. Díaz Redondo, M. I. Martín’Vicente, J. Forné, C. Campo, A. Fernández Vilas, L. J. de la Cruz Llopis, C. García-Rubio, A. Marín-López, A. Mohamad Mezher, D. Díaz Sánchez, H. Cerezo-Costas, D. Rebollo-Monedero, P. Arias Cabarcos, F. Rico-Novella, {IEEE} Access 8 (2020) 72435–72460.","mla":"Aguilar’Igartua, Mónica, et al. “INRISCO: INcident MonitoRing in Smart COmmunities.” <i>{IEEE} Access</i>, vol. 8, 2020, pp. 72435–60, doi:<a href=\"https://doi.org/10.1109/ACCESS.2020.2987483\">10.1109/ACCESS.2020.2987483</a>.","bibtex":"@article{Aguilar’Igartua_Almenárez-Mendoza_P. Díaz Redondo_I. Martín’Vicente_Forné_Campo_Fernández Vilas_J. de la Cruz Llopis_García-Rubio_Marín-López_et al._2020, title={INRISCO: INcident monitoRing in Smart COmmunities}, volume={8}, DOI={<a href=\"https://doi.org/10.1109/ACCESS.2020.2987483\">10.1109/ACCESS.2020.2987483</a>}, journal={{IEEE} Access}, author={Aguilar’Igartua, Mónica and Almenárez-Mendoza, Florina and P. Díaz Redondo, Rebeca and I. Martín’Vicente, Manuela and Forné, Jordi and Campo, Celeste and Fernández Vilas, Ana and J. de la Cruz Llopis, Luis and García-Rubio, Carlos and Marín-López, Andrés and et al.}, year={2020}, pages={72435–72460} }","apa":"Aguilar’Igartua, M., Almenárez-Mendoza, F., P. Díaz Redondo, R., I. Martín’Vicente, M., Forné, J., Campo, C., Fernández Vilas, A., J. de la Cruz Llopis, L., García-Rubio, C., Marín-López, A., Mohamad Mezher, A., Díaz Sánchez, D., Cerezo-Costas, H., Rebollo-Monedero, D., Arias Cabarcos, P., &#38; Rico-Novella, F. (2020). INRISCO: INcident monitoRing in Smart COmmunities. <i>{IEEE} Access</i>, <i>8</i>, 72435–72460. <a href=\"https://doi.org/10.1109/ACCESS.2020.2987483\">https://doi.org/10.1109/ACCESS.2020.2987483</a>"},"page":"72435-72460","intvolume":"         8","year":"2020"},{"year":"2019","citation":{"ama":"Seiler-Hwang S, Arias Cabarcos P, Marín A, Almenáres F, Díaz Sánchez D, Becker C. “I don’t see why I would ever want to use it”: Analyzing the Usability of Popular Smartphone Password Managers. In: Cavallaro L, Kinder J, Wang X, Katz J, eds. <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>. {ACM}; 2019:1937-1953. doi:<a href=\"https://doi.org/10.1145/3319535.3354192\">10.1145/3319535.3354192</a>","chicago":"Seiler-Hwang, Sunyoung, Patricia Arias Cabarcos, Andr{\\’{e}}s Marín, Florina Almenáres, Daniel Díaz Sánchez, and Christian Becker. “‘I Don’t See Why I Would Ever Want to Use It’: Analyzing the Usability of Popular Smartphone Password Managers.” In <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>, edited by Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz, 1937–53. {ACM}, 2019. <a href=\"https://doi.org/10.1145/3319535.3354192\">https://doi.org/10.1145/3319535.3354192</a>.","ieee":"S. Seiler-Hwang, P. Arias Cabarcos, A. Marín, F. Almenáres, D. Díaz Sánchez, and C. Becker, “‘I don’t see why I would ever want to use it’: Analyzing the Usability of Popular Smartphone Password Managers,” in <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>, 2019, pp. 1937–1953, doi: <a href=\"https://doi.org/10.1145/3319535.3354192\">10.1145/3319535.3354192</a>.","mla":"Seiler-Hwang, Sunyoung, et al. “‘I Don’t See Why I Would Ever Want to Use It’: Analyzing the Usability of Popular Smartphone Password Managers.” <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>, edited by Lorenzo Cavallaro et al., {ACM}, 2019, pp. 1937–53, doi:<a href=\"https://doi.org/10.1145/3319535.3354192\">10.1145/3319535.3354192</a>.","short":"S. Seiler-Hwang, P. Arias Cabarcos, A. Marín, F. Almenáres, D. Díaz Sánchez, C. Becker, in: L. Cavallaro, J. Kinder, X. Wang, J. Katz (Eds.), Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019, {ACM}, 2019, pp. 1937–1953.","bibtex":"@inproceedings{Seiler-Hwang_Arias Cabarcos_Marín_Almenáres_Díaz Sánchez_Becker_2019, title={“I don’t see why I would ever want to use it”: Analyzing the Usability of Popular Smartphone Password Managers}, DOI={<a href=\"https://doi.org/10.1145/3319535.3354192\">10.1145/3319535.3354192</a>}, booktitle={Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, publisher={{ACM}}, author={Seiler-Hwang, Sunyoung and Arias Cabarcos, Patricia and Marín, Andr{\\’{e}}s and Almenáres, Florina and Díaz Sánchez, Daniel and Becker, Christian}, editor={Cavallaro, Lorenzo and Kinder, Johannes and Wang, XiaoFeng and Katz, Jonathan}, year={2019}, pages={1937–1953} }","apa":"Seiler-Hwang, S., Arias Cabarcos, P., Marín, A., Almenáres, F., Díaz Sánchez, D., &#38; Becker, C. (2019). “I don’t see why I would ever want to use it”: Analyzing the Usability of Popular Smartphone Password Managers. In L. Cavallaro, J. Kinder, X. Wang, &#38; J. Katz (Eds.), <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i> (pp. 1937–1953). {ACM}. <a href=\"https://doi.org/10.1145/3319535.3354192\">https://doi.org/10.1145/3319535.3354192</a>"},"page":"1937-1953","title":"\"I don't see why I would ever want to use it\": Analyzing the Usability of Popular Smartphone Password Managers","doi":"10.1145/3319535.3354192","publisher":"{ACM}","date_updated":"2022-01-17T16:06:19Z","author":[{"last_name":"Seiler-Hwang","full_name":"Seiler-Hwang, Sunyoung","first_name":"Sunyoung"},{"first_name":"Patricia","id":"92804","full_name":"Arias Cabarcos, Patricia","last_name":"Arias Cabarcos"},{"first_name":"Andr{\\'{e}}s","full_name":"Marín, Andr{\\'{e}}s","last_name":"Marín"},{"full_name":"Almenáres, Florina","last_name":"Almenáres","first_name":"Florina"},{"last_name":"Díaz Sánchez","full_name":"Díaz Sánchez, Daniel","first_name":"Daniel"},{"first_name":"Christian","last_name":"Becker","full_name":"Becker, Christian"}],"date_created":"2021-12-08T19:13:30Z","editor":[{"first_name":"Lorenzo","last_name":"Cavallaro","full_name":"Cavallaro, Lorenzo"},{"full_name":"Kinder, Johannes","last_name":"Kinder","first_name":"Johannes"},{"last_name":"Wang","full_name":"Wang, XiaoFeng","first_name":"XiaoFeng"},{"last_name":"Katz","full_name":"Katz, Jonathan","first_name":"Jonathan"}],"status":"public","type":"conference","publication":"Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019","extern":"1","language":[{"iso":"eng"}],"_id":"28468","user_id":"92804"},{"doi":"10.1145/3319535.3363260","title":"Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems","author":[{"full_name":"Becker, Karen","last_name":"Becker","first_name":"Karen"},{"first_name":"Patricia","last_name":"Arias Cabarcos","full_name":"Arias Cabarcos, Patricia","id":"92804"},{"first_name":"Thilo","last_name":"Habrich","full_name":"Habrich, Thilo"},{"first_name":"Christian","last_name":"Becker","full_name":"Becker, Christian"}],"date_created":"2021-12-08T19:13:32Z","publisher":"{ACM}","date_updated":"2022-01-17T16:06:27Z","citation":{"chicago":"Becker, Karen, Patricia Arias Cabarcos, Thilo Habrich, and Christian Becker. “Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems.” In <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>, edited by Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz, 2577–79. {ACM}, 2019. <a href=\"https://doi.org/10.1145/3319535.3363260\">https://doi.org/10.1145/3319535.3363260</a>.","ieee":"K. Becker, P. Arias Cabarcos, T. Habrich, and C. Becker, “Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems,” in <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>, 2019, pp. 2577–2579, doi: <a href=\"https://doi.org/10.1145/3319535.3363260\">10.1145/3319535.3363260</a>.","ama":"Becker K, Arias Cabarcos P, Habrich T, Becker C. Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems. In: Cavallaro L, Kinder J, Wang X, Katz J, eds. <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>. {ACM}; 2019:2577-2579. doi:<a href=\"https://doi.org/10.1145/3319535.3363260\">10.1145/3319535.3363260</a>","bibtex":"@inproceedings{Becker_Arias Cabarcos_Habrich_Becker_2019, title={Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems}, DOI={<a href=\"https://doi.org/10.1145/3319535.3363260\">10.1145/3319535.3363260</a>}, booktitle={Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, publisher={{ACM}}, author={Becker, Karen and Arias Cabarcos, Patricia and Habrich, Thilo and Becker, Christian}, editor={Cavallaro, Lorenzo and Kinder, Johannes and Wang, XiaoFeng and Katz, Jonathan}, year={2019}, pages={2577–2579} }","mla":"Becker, Karen, et al. “Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems.” <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i>, edited by Lorenzo Cavallaro et al., {ACM}, 2019, pp. 2577–79, doi:<a href=\"https://doi.org/10.1145/3319535.3363260\">10.1145/3319535.3363260</a>.","short":"K. Becker, P. Arias Cabarcos, T. Habrich, C. Becker, in: L. Cavallaro, J. Kinder, X. Wang, J. Katz (Eds.), Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019, {ACM}, 2019, pp. 2577–2579.","apa":"Becker, K., Arias Cabarcos, P., Habrich, T., &#38; Becker, C. (2019). Poster: Towards a Framework for Assessing Vulnerabilities of Brainwave Authentication Systems. In L. Cavallaro, J. Kinder, X. Wang, &#38; J. Katz (Eds.), <i>Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019</i> (pp. 2577–2579). {ACM}. <a href=\"https://doi.org/10.1145/3319535.3363260\">https://doi.org/10.1145/3319535.3363260</a>"},"page":"2577-2579","year":"2019","extern":"1","language":[{"iso":"eng"}],"user_id":"92804","_id":"28469","status":"public","editor":[{"full_name":"Cavallaro, Lorenzo","last_name":"Cavallaro","first_name":"Lorenzo"},{"full_name":"Kinder, Johannes","last_name":"Kinder","first_name":"Johannes"},{"last_name":"Wang","full_name":"Wang, XiaoFeng","first_name":"XiaoFeng"},{"first_name":"Jonathan","full_name":"Katz, Jonathan","last_name":"Katz"}],"type":"conference","publication":"Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019"},{"type":"journal_article","publication":"{ACM} Comput. Surv.","status":"public","user_id":"92804","_id":"28466","extern":"1","language":[{"iso":"eng"}],"issue":"4","citation":{"apa":"Arias Cabarcos, P., Krupitzer, C., &#38; Becker, C. (2019). A Survey on Adaptive Authentication. <i>{ACM} Comput. Surv.</i>, <i>52</i>(4), 80:1-80:30. <a href=\"https://doi.org/10.1145/3336117\">https://doi.org/10.1145/3336117</a>","short":"P. Arias Cabarcos, C. Krupitzer, C. Becker, {ACM} Comput. Surv. 52 (2019) 80:1-80:30.","bibtex":"@article{Arias Cabarcos_Krupitzer_Becker_2019, title={A Survey on Adaptive Authentication}, volume={52}, DOI={<a href=\"https://doi.org/10.1145/3336117\">10.1145/3336117</a>}, number={4}, journal={{ACM} Comput. Surv.}, author={Arias Cabarcos, Patricia and Krupitzer, Christian and Becker, Christian}, year={2019}, pages={80:1-80:30} }","mla":"Arias Cabarcos, Patricia, et al. “A Survey on Adaptive Authentication.” <i>{ACM} Comput. Surv.</i>, vol. 52, no. 4, 2019, p. 80:1-80:30, doi:<a href=\"https://doi.org/10.1145/3336117\">10.1145/3336117</a>.","ieee":"P. Arias Cabarcos, C. Krupitzer, and C. Becker, “A Survey on Adaptive Authentication,” <i>{ACM} Comput. Surv.</i>, vol. 52, no. 4, p. 80:1-80:30, 2019, doi: <a href=\"https://doi.org/10.1145/3336117\">10.1145/3336117</a>.","chicago":"Arias Cabarcos, Patricia, Christian Krupitzer, and Christian Becker. “A Survey on Adaptive Authentication.” <i>{ACM} Comput. Surv.</i> 52, no. 4 (2019): 80:1-80:30. <a href=\"https://doi.org/10.1145/3336117\">https://doi.org/10.1145/3336117</a>.","ama":"Arias Cabarcos P, Krupitzer C, Becker C. A Survey on Adaptive Authentication. <i>{ACM} Comput Surv</i>. 2019;52(4):80:1-80:30. doi:<a href=\"https://doi.org/10.1145/3336117\">10.1145/3336117</a>"},"intvolume":"        52","page":"80:1-80:30","year":"2019","author":[{"first_name":"Patricia","last_name":"Arias Cabarcos","full_name":"Arias Cabarcos, Patricia","id":"92804"},{"first_name":"Christian","last_name":"Krupitzer","full_name":"Krupitzer, Christian"},{"first_name":"Christian","full_name":"Becker, Christian","last_name":"Becker"}],"date_created":"2021-12-08T19:13:28Z","volume":52,"date_updated":"2022-01-17T16:04:29Z","doi":"10.1145/3336117","title":"A Survey on Adaptive Authentication"},{"user_id":"92804","_id":"28465","language":[{"iso":"eng"}],"extern":"1","type":"journal_article","publication":"{IEEE} Commun. Surv. Tutorials","status":"public","date_created":"2021-12-08T19:13:26Z","author":[{"full_name":"Díaz Sánchez, Daniel","last_name":"Díaz Sánchez","first_name":"Daniel"},{"first_name":"Andrés","last_name":"Marín López","full_name":"Marín López, Andrés"},{"last_name":"Almenárez Mendoza","full_name":"Almenárez Mendoza, Florina","first_name":"Florina"},{"first_name":"Patricia","full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos"},{"first_name":"R.","full_name":"Simon Sherratt, R.","last_name":"Simon Sherratt"}],"volume":21,"date_updated":"2022-01-27T16:54:45Z","doi":"10.1109/COMST.2019.2914453","title":"TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications","issue":"4","citation":{"short":"D. Díaz Sánchez, A. Marín López, F. Almenárez Mendoza, P. Arias Cabarcos, R. Simon Sherratt, {IEEE} Commun. Surv. Tutorials 21 (2019) 3502–3531.","mla":"Díaz Sánchez, Daniel, et al. “TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications.” <i>{IEEE} Commun. Surv. Tutorials</i>, vol. 21, no. 4, 2019, pp. 3502–31, doi:<a href=\"https://doi.org/10.1109/COMST.2019.2914453\">10.1109/COMST.2019.2914453</a>.","bibtex":"@article{Díaz Sánchez_Marín López_Almenárez Mendoza_Arias Cabarcos_Simon Sherratt_2019, title={TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications}, volume={21}, DOI={<a href=\"https://doi.org/10.1109/COMST.2019.2914453\">10.1109/COMST.2019.2914453</a>}, number={4}, journal={{IEEE} Commun. Surv. Tutorials}, author={Díaz Sánchez, Daniel and Marín López, Andrés and Almenárez Mendoza, Florina and Arias Cabarcos, Patricia and Simon Sherratt, R.}, year={2019}, pages={3502–3531} }","apa":"Díaz Sánchez, D., Marín López, A., Almenárez Mendoza, F., Arias Cabarcos, P., &#38; Simon Sherratt, R. (2019). TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications. <i>{IEEE} Commun. Surv. Tutorials</i>, <i>21</i>(4), 3502–3531. <a href=\"https://doi.org/10.1109/COMST.2019.2914453\">https://doi.org/10.1109/COMST.2019.2914453</a>","ama":"Díaz Sánchez D, Marín López A, Almenárez Mendoza F, Arias Cabarcos P, Simon Sherratt R. TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications. <i>{IEEE} Commun Surv Tutorials</i>. 2019;21(4):3502-3531. doi:<a href=\"https://doi.org/10.1109/COMST.2019.2914453\">10.1109/COMST.2019.2914453</a>","ieee":"D. Díaz Sánchez, A. Marín López, F. Almenárez Mendoza, P. Arias Cabarcos, and R. Simon Sherratt, “TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications,” <i>{IEEE} Commun. Surv. Tutorials</i>, vol. 21, no. 4, pp. 3502–3531, 2019, doi: <a href=\"https://doi.org/10.1109/COMST.2019.2914453\">10.1109/COMST.2019.2914453</a>.","chicago":"Díaz Sánchez, Daniel, Andrés Marín López, Florina Almenárez Mendoza, Patricia Arias Cabarcos, and R. Simon Sherratt. “TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications.” <i>{IEEE} Commun. Surv. Tutorials</i> 21, no. 4 (2019): 3502–31. <a href=\"https://doi.org/10.1109/COMST.2019.2914453\">https://doi.org/10.1109/COMST.2019.2914453</a>."},"page":"3502-3531","intvolume":"        21","year":"2019"},{"title":"DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT","doi":"10.3390/s19153292","date_updated":"2022-01-27T16:55:38Z","volume":19,"author":[{"full_name":"Díaz Sánchez, Daniel","last_name":"Díaz Sánchez","first_name":"Daniel"},{"last_name":"Marín López","full_name":"Marín López, Andrés","first_name":"Andrés"},{"last_name":"Almenárez Mendoza","full_name":"Almenárez Mendoza, Florina","first_name":"Florina"},{"full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos","first_name":"Patricia"}],"date_created":"2021-12-08T19:13:29Z","year":"2019","intvolume":"        19","page":"3292","citation":{"chicago":"Díaz Sánchez, Daniel, Andrés Marín López, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. “DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT.” <i>Sensors</i> 19, no. 15 (2019): 3292. <a href=\"https://doi.org/10.3390/s19153292\">https://doi.org/10.3390/s19153292</a>.","ieee":"D. Díaz Sánchez, A. Marín López, F. Almenárez Mendoza, and P. Arias Cabarcos, “DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT,” <i>Sensors</i>, vol. 19, no. 15, p. 3292, 2019, doi: <a href=\"https://doi.org/10.3390/s19153292\">10.3390/s19153292</a>.","ama":"Díaz Sánchez D, Marín López A, Almenárez Mendoza F, Arias Cabarcos P. DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT. <i>Sensors</i>. 2019;19(15):3292. doi:<a href=\"https://doi.org/10.3390/s19153292\">10.3390/s19153292</a>","apa":"Díaz Sánchez, D., Marín López, A., Almenárez Mendoza, F., &#38; Arias Cabarcos, P. (2019). DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT. <i>Sensors</i>, <i>19</i>(15), 3292. <a href=\"https://doi.org/10.3390/s19153292\">https://doi.org/10.3390/s19153292</a>","bibtex":"@article{Díaz Sánchez_Marín López_Almenárez Mendoza_Arias Cabarcos_2019, title={DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT}, volume={19}, DOI={<a href=\"https://doi.org/10.3390/s19153292\">10.3390/s19153292</a>}, number={15}, journal={Sensors}, author={Díaz Sánchez, Daniel and Marín López, Andrés and Almenárez Mendoza, Florina and Arias Cabarcos, Patricia}, year={2019}, pages={3292} }","mla":"Díaz Sánchez, Daniel, et al. “DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT.” <i>Sensors</i>, vol. 19, no. 15, 2019, p. 3292, doi:<a href=\"https://doi.org/10.3390/s19153292\">10.3390/s19153292</a>.","short":"D. Díaz Sánchez, A. Marín López, F. Almenárez Mendoza, P. Arias Cabarcos, Sensors 19 (2019) 3292."},"issue":"15","language":[{"iso":"eng"}],"extern":"1","_id":"28467","user_id":"92804","status":"public","publication":"Sensors","type":"journal_article"},{"language":[{"iso":"eng"}],"extern":"1","user_id":"92804","series_title":"{MDPI} Proceedings","_id":"28473","status":"public","editor":[{"first_name":"Jos{\\'{e}}","full_name":"Bravo, Jos{\\'{e}}","last_name":"Bravo"},{"first_name":"Oresti","full_name":"Ba{\\~{n}}os, Oresti","last_name":"Ba{\\~{n}}os"}],"publication":"12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018","type":"conference","doi":"10.3390/proceedings2191235","title":"Assessment of Fitness Tracker Security: A Case of Study","volume":2,"date_created":"2021-12-08T19:13:37Z","author":[{"last_name":"Almenárez Mendoxa","full_name":"Almenárez Mendoxa, Florina","first_name":"Florina"},{"first_name":"Lucía","full_name":"Alonso, Lucía","last_name":"Alonso"},{"first_name":"Andrés","last_name":"Marín López","full_name":"Marín López, Andrés"},{"full_name":"Díaz Sánchez, Daniel","last_name":"Díaz Sánchez","first_name":"Daniel"},{"last_name":"Arias Cabarcos","id":"92804","full_name":"Arias Cabarcos, Patricia","first_name":"Patricia"}],"date_updated":"2022-01-27T17:01:23Z","publisher":"{MDPI}","page":"1235","intvolume":"         2","citation":{"ieee":"F. Almenárez Mendoxa, L. Alonso, A. Marín López, D. Díaz Sánchez, and P. Arias Cabarcos, “Assessment of Fitness Tracker Security: A Case of Study,” in <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>, 2018, vol. 2, no. 19, p. 1235, doi: <a href=\"https://doi.org/10.3390/proceedings2191235\">10.3390/proceedings2191235</a>.","chicago":"Almenárez Mendoxa, Florina, Lucía Alonso, Andrés Marín López, Daniel Díaz Sánchez, and Patricia Arias Cabarcos. “Assessment of Fitness Tracker Security: A Case of Study.” In <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>, edited by Jos{\\’{e}} Bravo and Oresti Ba{\\~{n}}os, 2:1235. {MDPI} Proceedings. {MDPI}, 2018. <a href=\"https://doi.org/10.3390/proceedings2191235\">https://doi.org/10.3390/proceedings2191235</a>.","ama":"Almenárez Mendoxa F, Alonso L, Marín López A, Díaz Sánchez D, Arias Cabarcos P. Assessment of Fitness Tracker Security: A Case of Study. In: Bravo J, Ba{\\~{n}}os O, eds. <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>. Vol 2. {MDPI} Proceedings. {MDPI}; 2018:1235. doi:<a href=\"https://doi.org/10.3390/proceedings2191235\">10.3390/proceedings2191235</a>","apa":"Almenárez Mendoxa, F., Alonso, L., Marín López, A., Díaz Sánchez, D., &#38; Arias Cabarcos, P. (2018). Assessment of Fitness Tracker Security: A Case of Study. In J. Bravo &#38; O. Ba{\\~{n}}os (Eds.), <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i> (Vol. 2, Issue 19, p. 1235). {MDPI}. <a href=\"https://doi.org/10.3390/proceedings2191235\">https://doi.org/10.3390/proceedings2191235</a>","mla":"Almenárez Mendoxa, Florina, et al. “Assessment of Fitness Tracker Security: A Case of Study.” <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>, edited by Jos{\\’{e}} Bravo and Oresti Ba{\\~{n}}os, vol. 2, no. 19, {MDPI}, 2018, p. 1235, doi:<a href=\"https://doi.org/10.3390/proceedings2191235\">10.3390/proceedings2191235</a>.","bibtex":"@inproceedings{Almenárez Mendoxa_Alonso_Marín López_Díaz Sánchez_Arias Cabarcos_2018, series={{MDPI} Proceedings}, title={Assessment of Fitness Tracker Security: A Case of Study}, volume={2}, DOI={<a href=\"https://doi.org/10.3390/proceedings2191235\">10.3390/proceedings2191235</a>}, number={19}, booktitle={12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018}, publisher={{MDPI}}, author={Almenárez Mendoxa, Florina and Alonso, Lucía and Marín López, Andrés and Díaz Sánchez, Daniel and Arias Cabarcos, Patricia}, editor={Bravo, Jos{\\’{e}} and Ba{\\~{n}}os, Oresti}, year={2018}, pages={1235}, collection={{MDPI} Proceedings} }","short":"F. Almenárez Mendoxa, L. Alonso, A. Marín López, D. Díaz Sánchez, P. Arias Cabarcos, in: J. Bravo, O. Ba{\\~{n}}os (Eds.), 12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018, {MDPI}, 2018, p. 1235."},"year":"2018","issue":"19"},{"editor":[{"first_name":"Roger","full_name":"A. Hallman, Roger","last_name":"A. Hallman"},{"full_name":"Li, Shujun","last_name":"Li","first_name":"Shujun"},{"first_name":"Victor","full_name":"Chang, Victor","last_name":"Chang"}],"status":"public","publication":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018","type":"conference","language":[{"iso":"eng"}],"extern":"1","_id":"28471","user_id":"92804","year":"2018","page":"18-26","citation":{"ieee":"P. Arias Cabarcos, F. Almenárez, D. Díaz Sánchez, and A. Marín, “FRiCS: A Framework for Risk-driven Cloud Selection,” in <i>Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018</i>, 2018, pp. 18–26, doi: <a href=\"https://doi.org/10.1145/3267357.3267362\">10.1145/3267357.3267362</a>.","chicago":"Arias Cabarcos, Patricia, Florina Almenárez, Daniel Díaz Sánchez, and Andrés Marín. “FRiCS: A Framework for Risk-Driven Cloud Selection.” In <i>Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018</i>, edited by Roger A. Hallman, Shujun Li, and Victor Chang, 18–26. {ACM}, 2018. <a href=\"https://doi.org/10.1145/3267357.3267362\">https://doi.org/10.1145/3267357.3267362</a>.","ama":"Arias Cabarcos P, Almenárez F, Díaz Sánchez D, Marín A. FRiCS: A Framework for Risk-driven Cloud Selection. In: A. Hallman R, Li S, Chang V, eds. <i>Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018</i>. {ACM}; 2018:18-26. doi:<a href=\"https://doi.org/10.1145/3267357.3267362\">10.1145/3267357.3267362</a>","short":"P. Arias Cabarcos, F. Almenárez, D. Díaz Sánchez, A. Marín, in: R. A. Hallman, S. Li, V. Chang (Eds.), Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018, {ACM}, 2018, pp. 18–26.","mla":"Arias Cabarcos, Patricia, et al. “FRiCS: A Framework for Risk-Driven Cloud Selection.” <i>Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018</i>, edited by Roger A. Hallman et al., {ACM}, 2018, pp. 18–26, doi:<a href=\"https://doi.org/10.1145/3267357.3267362\">10.1145/3267357.3267362</a>.","bibtex":"@inproceedings{Arias Cabarcos_Almenárez_Díaz Sánchez_Marín_2018, title={FRiCS: A Framework for Risk-driven Cloud Selection}, DOI={<a href=\"https://doi.org/10.1145/3267357.3267362\">10.1145/3267357.3267362</a>}, booktitle={Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018}, publisher={{ACM}}, author={Arias Cabarcos, Patricia and Almenárez, Florina and Díaz Sánchez, Daniel and Marín, Andrés}, editor={A. Hallman, Roger and Li, Shujun and Chang, Victor}, year={2018}, pages={18–26} }","apa":"Arias Cabarcos, P., Almenárez, F., Díaz Sánchez, D., &#38; Marín, A. (2018). FRiCS: A Framework for Risk-driven Cloud Selection. In R. A. Hallman, S. Li, &#38; V. Chang (Eds.), <i>Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018</i> (pp. 18–26). {ACM}. <a href=\"https://doi.org/10.1145/3267357.3267362\">https://doi.org/10.1145/3267357.3267362</a>"},"title":"FRiCS: A Framework for Risk-driven Cloud Selection","doi":"10.1145/3267357.3267362","date_updated":"2022-01-27T17:01:46Z","publisher":"{ACM}","author":[{"first_name":"Patricia","full_name":"Arias Cabarcos, Patricia","id":"92804","last_name":"Arias Cabarcos"},{"full_name":"Almenárez, Florina","last_name":"Almenárez","first_name":"Florina"},{"first_name":"Daniel","last_name":"Díaz Sánchez","full_name":"Díaz Sánchez, Daniel"},{"last_name":"Marín","full_name":"Marín, Andrés","first_name":"Andrés"}],"date_created":"2021-12-08T19:13:34Z"},{"_id":"28472","user_id":"92804","series_title":"{MDPI} Proceedings","extern":"1","language":[{"iso":"eng"}],"type":"conference","publication":"12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018","editor":[{"first_name":"Jos{\\'{e}}","last_name":"Bravo","full_name":"Bravo, Jos{\\'{e}}"},{"last_name":"Baños","full_name":"Baños, Oresti","first_name":"Oresti"}],"status":"public","date_updated":"2022-01-27T17:06:31Z","publisher":"{MDPI}","date_created":"2021-12-08T19:13:36Z","author":[{"first_name":"Daniel","full_name":"Díaz Sánchez, Daniel","last_name":"Díaz Sánchez"},{"first_name":"Andr{\\'{e}}s","full_name":"Marín López, Andr{\\'{e}}s","last_name":"Marín López"},{"first_name":"Florina","last_name":"Almenárez Mendoza","full_name":"Almenárez Mendoza, Florina"},{"first_name":"Patricia","last_name":"Arias Cabarcos","id":"92804","full_name":"Arias Cabarcos, Patricia"}],"volume":2,"title":"DNS-Based Dynamic Authentication for Microservices in IoT","doi":"10.3390/proceedings2191233","issue":"19","year":"2018","citation":{"chicago":"Díaz Sánchez, Daniel, Andr{\\’{e}}s Marín López, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. “DNS-Based Dynamic Authentication for Microservices in IoT.” In <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>, edited by Jos{\\’{e}} Bravo and Oresti Baños, 2:1233. {MDPI} Proceedings. {MDPI}, 2018. <a href=\"https://doi.org/10.3390/proceedings2191233\">https://doi.org/10.3390/proceedings2191233</a>.","ieee":"D. Díaz Sánchez, A. Marín López, F. Almenárez Mendoza, and P. Arias Cabarcos, “DNS-Based Dynamic Authentication for Microservices in IoT,” in <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>, 2018, vol. 2, no. 19, p. 1233, doi: <a href=\"https://doi.org/10.3390/proceedings2191233\">10.3390/proceedings2191233</a>.","ama":"Díaz Sánchez D, Marín López A, Almenárez Mendoza F, Arias Cabarcos P. DNS-Based Dynamic Authentication for Microservices in IoT. In: Bravo J, Baños O, eds. <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>. Vol 2. {MDPI} Proceedings. {MDPI}; 2018:1233. doi:<a href=\"https://doi.org/10.3390/proceedings2191233\">10.3390/proceedings2191233</a>","apa":"Díaz Sánchez, D., Marín López, A., Almenárez Mendoza, F., &#38; Arias Cabarcos, P. (2018). DNS-Based Dynamic Authentication for Microservices in IoT. In J. Bravo &#38; O. Baños (Eds.), <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i> (Vol. 2, Issue 19, p. 1233). {MDPI}. <a href=\"https://doi.org/10.3390/proceedings2191233\">https://doi.org/10.3390/proceedings2191233</a>","short":"D. Díaz Sánchez, A. Marín López, F. Almenárez Mendoza, P. Arias Cabarcos, in: J. Bravo, O. Baños (Eds.), 12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018, {MDPI}, 2018, p. 1233.","mla":"Díaz Sánchez, Daniel, et al. “DNS-Based Dynamic Authentication for Microservices in IoT.” <i>12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018</i>, edited by Jos{\\’{e}} Bravo and Oresti Baños, vol. 2, no. 19, {MDPI}, 2018, p. 1233, doi:<a href=\"https://doi.org/10.3390/proceedings2191233\">10.3390/proceedings2191233</a>.","bibtex":"@inproceedings{Díaz Sánchez_Marín López_Almenárez Mendoza_Arias Cabarcos_2018, series={{MDPI} Proceedings}, title={DNS-Based Dynamic Authentication for Microservices in IoT}, volume={2}, DOI={<a href=\"https://doi.org/10.3390/proceedings2191233\">10.3390/proceedings2191233</a>}, number={19}, booktitle={12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018}, publisher={{MDPI}}, author={Díaz Sánchez, Daniel and Marín López, Andr{\\’{e}}s and Almenárez Mendoza, Florina and Arias Cabarcos, Patricia}, editor={Bravo, Jos{\\’{e}} and Baños, Oresti}, year={2018}, pages={1233}, collection={{MDPI} Proceedings} }"},"intvolume":"         2","page":"1233"}]
