


default search action
24th Financial Cryptography 2020: Kota Kinabalu, Malaysia - Workshops
- Matthew Bernhard, Andrea Bracciali
, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, Peter B. Rønne
, Massimiliano Sala
:
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12063, Springer 2020, ISBN 978-3-030-54454-6
AsiaUSEC: First Asian Workshop on Usable Security
- Jihye Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea. 3-17 - Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, L. Jean Camp:
User-Centered Risk Communication for Safer Browsing. 18-35 - Adrian Reuter
, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, Wadie Lemrazzeq:
Secure Email - A Usability Study. 36-46 - George Nasser
, Ben W. Morrison
, Piers Bayl-Smith
, Ronnie Taib
, Michael Gayed, Mark W. Wiggins
:
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails. 47-55 - Piers Bayl-Smith
, Daniel Sturman
, Mark W. Wiggins
:
Cue Utilization, Phishing Feature and Phishing Email Detection. 56-70 - Kovila P. L. Coopamootoo:
Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method Preferences. 71-83 - Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer
, Nina Gerber
, Melanie Volkamer:
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation. 84-101 - Hilda Hadan
, Sameer Patil
:
Understanding Perceptions of Smart Devices. 102-121 - Jan Tolsdorf
, Florian Dehling
:
In Our Employer We Trust: Mental Models of Office Workers' Privacy Perceptions. 122-136 - David Oyebisi, Kennedy Njenga
:
Behaviour of Outsourced Employees as Sources of Information System Security Threats. 137-148 - Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
Exploring Effects of Auditory Stimuli on CAPTCHA Performance. 149-165 - Xian Chu, Huiping Sun, Zhong Chen:
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. 166-176 - Kovila P. L. Coopamootoo:
Empathy as a Response to Frustration in Password Choice. 177-191 - Harshal Tupsamudre, Monika Sahu, Kumar Vidhani, Sachin Lodha:
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage. 192-206 - Jacqui Taylor-Jackson, John McAlaney, Jeffrey L. Foster
, Abubakar Bello, Alana Maurushat, John Dale:
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach. 207-217
CoDeFi: First Workshop on Coordination of Decentralized Finance
- Shin'ichiro Matsuo:
Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020. 221-229 - Shigeya Suzuki
:
Multistakeholder Governance for the Internet. 230-241 - Yuta Takanashi:
Future of Finance - From G20 to Practical Implementation of Multi-stakeholder Governance on Blockchain Based Finance. 242-253 - Yuji Suga, Masaki Shimaoka, Masashi Sato, Hirotaka Nakajima:
Securing Cryptocurrency Exchange: Building up Standard from Huge Failures. 254-270
VOTING 2020: Fifth Workshop on Advances in Secure Electronic Voting
- Enka Blanchard, Ted Selker:
Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification. 273-290 - Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud
:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. 291-309 - Marie-Laure Zollinger
, Peter B. Rønne
, Peter Y. A. Ryan:
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme. 310-318 - Philip B. Stark
:
Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA. 319-336 - Sarah Morin, Grant McClearn, Neal McBurnett
, Poorvi L. Vora, Filip Zagórski
:
A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections. 337-344 - Colin Boyd, Thomas Haines, Peter B. Rønne
:
Vote Selling Resistant Voting. 345-359 - Thomas Haines, Olivier Pereira, Peter B. Rønne
:
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities. 360-368 - Rolf Haenni, Philipp Locher:
Performance of Shuffling: Taking It to the Limits. 369-385
WTSC 2020: Fourth Workshop on Trusted Smart Contracts
- Monika Di Angelo
, Gernot Salzer
:
Characterizing Types of Smart Contracts in the Ethereum Landscape. 389-404 - Afiya Ayman, Shanto Roy, Amin Alipour, Aron Laszka
:
Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media. 405-422 - Alexander Chepurnoy, Amitabh Saxena:
Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. 423-435 - Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:
Scalable Open-Vote Network on Ethereum. 436-450 - Jianan Su, Michael Bartholic
, Andrew Stange, Ryosuke Ushida, Shin'ichiro Matsuo:
How to Dynamically Incentivize Sufficient Level of IoT Security. 451-465 - Tatsuo Mitani, Akira Otsuka:
Confidential and Auditable Payments. 466-480 - Somanath Tripathy, Susil Kumar Mohanty:
MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network. 481-495 - Pablo Lamela Seijas
, Alexander Nemish, David Smith, Simon J. Thompson:
Marlowe: Implementing and Analysing Financial Contracts on Blockchain. 496-511 - Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing for Sharded Blockchains. 512-524 - Manuel M. T. Chakravarty, James Chapman, Kenneth MacKenzie, Orestis Melkonian, Michael Peyton Jones, Philip Wadler:
The Extended UTXO Model. 525-539 - Apoorvaa Deshpande, Maurice Herlihy:
Privacy-Preserving Cross-Chain Atomic Swaps. 540-549 - Kumaramangalam Muni Venkateswarlu, Sepideh Avizheh, Reihaneh Safavi-Naini:
A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods. 550-567 - Fausto Spoto
:
Enforcing Determinism of Java Smart Contracts. 568-583 - Bruno Bernardo, Raphaël Cauderlier, Basile Pesin, Julien Tesson:
Albert, An Intermediate Smart-Contract Language for the Tezos Blockchain. 584-598 - Fritz Henglein, Christian Kjær Larsen, Agata Murawska:
A Formally Verified Static Analysis Framework for Compositional Contracts. 599-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.