Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You
|
2020 |
Reinheimer, Benjamin Maximilian |
Shaping Our Mental Model of Security (Transcript of Discussion)
|
2020 |
Radomirović, Saša |
Human-Computability Boundaries (Transcript of Discussion)
|
2020 |
Kothari, Vijay |
Challenges in Designing a Distributed Cryptographic File System
|
2020 |
Bozorgi, Arastoo |
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion)
|
2020 |
Bozorgi, Arastoo |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come
|
2020 |
Chuat, Laurent |
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion)
|
2020 |
Gligor, Virgil D. |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers
|
2020 |
Kraus, Lydia |
Shaping Our Mental Model of Security
|
2020 |
Radomirović, Saša |
Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion)
|
2020 |
Mavroudis, Vasilios |
Mismorphism: The Heart of the Weird Machine
|
2020 |
Anantharaman, Prashant |
Social Constructionism in Security Protocols (Transcript of Discussion)
|
2020 |
Foley, Simon N. |
Human-Computability Boundaries
|
2020 |
Kothari, Vijay |
Snitches Get Stitches: On the Difficulty of Whistleblowing
|
2020 |
Ahmed-Rengers, Mansoor |
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion)
|
2020 |
Ahmed-Rengers, Mansoor |
Bounded Temporal Fairness for FIFO Financial Markets
|
2020 |
Mavroudis, Vasilios |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions
|
2020 |
Vasile, Diana A. |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans
|
2020 |
Hicks, Alexander |
Audio CAPTCHA with a Few Cocktails: It’s So Noisy I Can’t Hear You (Transcript of Discussion)
|
2020 |
Reinheimer, Benjamin Maximilian |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion)
|
2020 |
Murdoch, Steven J. |