Security and Privacy Awareness in Smart Environments — A Cross-Country Investigation
|
2020 |
Kulyk, Oksana |
Behaviour of Outsourced Employees as Sources of Information System Security Threats
|
2020 |
Oyebisi, David |
Empathy as a Response to Frustration in Password Choice
|
2020 |
Coopamootoo, Kovila P. L. |
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
|
2020 |
Chu, Xian |
Towards Improving the Efficacy of Code-Based Verification in Internet Voting
|
2020 |
Kulyk, Oksana |
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities
|
2020 |
Haines, Thomas |
The Extended UTXO Model
|
2020 |
Chakravarty, Manuel M. T. |
User-Centered Risk Communication for Safer Browsing
|
2020 |
Das, Sanchari |
Cue Utilization, Phishing Feature and Phishing Email Detection
|
2020 |
Bayl-Smith, Piers |
In Our Employer We Trust: Mental Models of Office Workers’ Privacy Perception
|
2020 |
Tolsdorf, Jan |
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage
|
2020 |
Tupsamudre, Harshal |
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach
|
2020 |
Taylor-Jackson, Jacqui |
Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification
|
2020 |
Blanchard, Enka |
Characterizing Types of Smart Contracts in the Ethereum Landscape
|
2020 |
Angelo, Monika di |
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
|
2020 |
Chepurnoy, Alexander |
A Blockchain Based Approach to Resource Sharing for Compositional Contracts in Smart Neighbourhoods
|
2020 |
Venkateswarlu, Kumaramangalam Muni |
Tale of Two Browsers: Understanding Users’ Web Browser Choices in South Korea
|
2020 |
Woo, Jihye |
Secure Email - A Usability Study
|
2020 |
Reuter, Adrian |
Understanding Perceptions of Smart Devices
|
2020 |
Hadan, Hilda |
Future of Finance: From G20 to Practical Implementation Multi-stakeholder Governance on Blockchain Based Finance
|
2020 |
Takanashi, Yuta |