1. [1] R. Abu-Salma, E. M. Redmiles, B. Ur, and M. Wei. Exploring User Mental Models of End-to-End Encrypted Communication Tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018.
2. [2] R. Abu-Salma, M. A. Sasse, J. Bonneau, A. Danilova, A. Naiakshina, and M. Smith. Obstacles to the Adoption of Secure Communication Tools. In 2017 IEEE Symposium on Security and Privacy (SP), pages 137–153, San Jose, CA, USA, May 2017. IEEE.
3. [3] S. D. Agarwal, M. L. Barthel, C. Rost, A. Borning, W. L. Bennett, and C. N. Johnson. Grassroots organizing in the digital age: considering values and technology in Tea Party and Occupy Wall Street. Information, Communication & Society, 17(3):326–341, 2014.
4. [4] E. Atwater, C. Bocovich, U. Hengartner, E. Lank, and I. Goldberg. Leading Johnny to Water: Designing for Usability and Trust. In Eleventh Symposium On Usable Privacy and Security (SOUPS), pages 69–88, 2015.
5. [5] W. Bai, D. Kim, M. Namara, Y. Qian, P. G. Kelley, and M. L. Mazurek. An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), pages 113–130, Denver, CO, 2016.