Skip to main content
USENIX
Conferences
Students
Sign in
Home
Attend
Registration Information
Registration Discounts
Venue, Hotel, and Travel
Students and Grants
Program
At a Glance
Symposium Program
2nd Workshop on Security Information Workers
Who Are You?! Adventures in Authentication
Workshop on Privacy Indicators
Workshop on Security Fatigue
Workshop on the Future of Privacy Notices and Indicators: Will Drones Deliver My Privacy Policy?
Activities
Poster Session
Birds-of-a-Feather Sessions
Sponsorship
Participate
Instructions for Authors and Speakers
Call for Nominations
Call for Papers
Call for Posters and Proposals
Call for Papers: 2nd Workshop on Security Information Workers
Call for Papers: Who are you?! Adventures in Authentication
Call for Papers: Workshop on Privacy Indicators
Call for Papers: Workshop on Security Fatigue
Workshop: Will Drones Deliver My Privacy Policy?
About
Organizers
Past Symposia
sponsors
Gold Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Home
Attend
Program
Activities
Sponsorship
Participate
About
connect with us
Twitter
Facebook
LinkedIn
Google+
YouTube
twitter
Tweets by @usenix
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
Encryption and Surveillance
Tweet
connect with us
Encryption and Surveillance
Presentations:
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems
User Attitudes Toward the Inspection of Encrypted Traffic
Snooping on Mobile Phones: Prevalence and Trends
Expert and Non-Expert Attitudes towards (Secure) Instant Messaging
Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US
connect with us