Tale of Two Browsers: Understanding Users’ Web Browser Choices in South Korea
|
2020 |
Woo, Jihye |
Secure Email - A Usability Study
|
2020 |
Reuter, Adrian |
Understanding Perceptions of Smart Devices
|
2020 |
Hadan, Hilda |
Future of Finance: From G20 to Practical Implementation Multi-stakeholder Governance on Blockchain Based Finance
|
2020 |
Takanashi, Yuta |
A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections
|
2020 |
Morin, Sarah |
Scalable Open-Vote Network on Ethereum
|
2020 |
Seifelnasr, Mohamed |
Confidential and Auditable Payments
|
2020 |
Mitani, Tatsuo |
Marlowe: Implementing and Analysing Financial Contracts on Blockchain
|
2020 |
Seijas, Pablo Lamela |
Enforcing Determinism of Java Smart Contracts
|
2020 |
Spoto, Fausto |
Privacy-Preserving Cross-Chain Atomic Swaps
|
2020 |
Deshpande, Apoorvaa |
A Formally Verified Static Analysis Framework for Compositional Contracts
|
2020 |
Henglein, Fritz |
Security and Privacy Awareness in Smart Environments — A Cross-Country Investigation
|
2020 |
Kulyk, Oksana |
Behaviour of Outsourced Employees as Sources of Information System Security Threats
|
2020 |
Oyebisi, David |
Empathy as a Response to Frustration in Password Choice
|
2020 |
Coopamootoo, Kovila P. L. |
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
|
2020 |
Chu, Xian |
Towards Improving the Efficacy of Code-Based Verification in Internet Voting
|
2020 |
Kulyk, Oksana |
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
|
2020 |
Haines, Thomas |
The Extended UTXO Model
|
2020 |
Chakravarty, Manuel M. T. |
User-Centered Risk Communication for Safer Browsing
|
2020 |
Das, Sanchari |
Cue Utilization, Phishing Feature and Phishing Email Detection
|
2020 |
Bayl-Smith, Piers |