User-Centered Risk Communication for Safer Browsing
|
2020 |
Das, Sanchari |
Cue Utilization, Phishing Feature and Phishing Email Detection
|
2020 |
Bayl-Smith, Piers |
In Our Employer We Trust: Mental Models of Office Workers’ Privacy Perception
|
2020 |
Tolsdorf, Jan |
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage
|
2020 |
Tupsamudre, Harshal |
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach
|
2020 |
Taylor-Jackson, Jacqui |
Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification
|
2020 |
Blanchard, Enka |
Characterizing Types of Smart Contracts in the Ethereum Landscape
|
2020 |
Angelo, Monika di |
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts
|
2020 |
Chepurnoy, Alexander |
A Blockchain Based Approach to Resource Sharing for Compositional Contracts in Smart Neighbourhoods
|
2020 |
Venkateswarlu, Kumaramangalam Muni |
Tale of Two Browsers: Understanding Users’ Web Browser Choices in South Korea
|
2020 |
Woo, Jihye |
Secure Email - A Usability Study
|
2020 |
Reuter, Adrian |
Understanding Perceptions of Smart Devices
|
2020 |
Hadan, Hilda |
Future of Finance: From G20 to Practical Implementation Multi-stakeholder Governance on Blockchain Based Finance
|
2020 |
Takanashi, Yuta |
A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections
|
2020 |
Morin, Sarah |
Scalable Open-Vote Network on Ethereum
|
2020 |
Seifelnasr, Mohamed |
Confidential and Auditable Payments
|
2020 |
Mitani, Tatsuo |
Marlowe: Implementing and Analysing Financial Contracts on Blockchain
|
2020 |
Seijas, Pablo Lamela |
Enforcing Determinism of Java Smart Contracts
|
2020 |
Spoto, Fausto |
Privacy-Preserving Cross-Chain Atomic Swaps
|
2020 |
Deshpande, Apoorvaa |
A Formally Verified Static Analysis Framework for Compositional Contracts
|
2020 |
Henglein, Fritz |