


default search action
24th Financial Cryptography 2020: Kota Kinabalu, Malaysia - Workshops
- Matthew Bernhard, Andrea Bracciali

, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, Peter B. Rønne
, Massimiliano Sala
:
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12063, Springer 2020, ISBN 978-3-030-54454-6
AsiaUSEC: First Asian Workshop on Usable Security
- Jihye Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo:

Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea. 3-17 - Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, L. Jean Camp:

User-Centered Risk Communication for Safer Browsing. 18-35 - Adrian Reuter

, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, Wadie Lemrazzeq:
Secure Email - A Usability Study. 36-46 - George Nasser

, Ben W. Morrison
, Piers Bayl-Smith
, Ronnie Taib
, Michael Gayed, Mark W. Wiggins
:
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails. 47-55 - Piers Bayl-Smith

, Daniel Sturman
, Mark W. Wiggins
:
Cue Utilization, Phishing Feature and Phishing Email Detection. 56-70 - Kovila P. L. Coopamootoo:

Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method Preferences. 71-83 - Oksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer

, Nina Gerber
, Melanie Volkamer:
Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation. 84-101 - Hilda Hadan

, Sameer Patil
:
Understanding Perceptions of Smart Devices. 102-121 - Jan Tolsdorf

, Florian Dehling
:
In Our Employer We Trust: Mental Models of Office Workers' Privacy Perceptions. 122-136 - David Oyebisi, Kennedy Njenga

:
Behaviour of Outsourced Employees as Sources of Information System Security Threats. 137-148 - Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:

Exploring Effects of Auditory Stimuli on CAPTCHA Performance. 149-165 - Xian Chu, Huiping Sun, Zhong Chen:

PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. 166-176 - Kovila P. L. Coopamootoo:

Empathy as a Response to Frustration in Password Choice. 177-191 - Harshal Tupsamudre, Monika Sahu, Kumar Vidhani, Sachin Lodha:

Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage. 192-206 - Jacqui Taylor-Jackson, John McAlaney, Jeffrey L. Foster

, Abubakar Bello, Alana Maurushat, John Dale:
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach. 207-217
CoDeFi: First Workshop on Coordination of Decentralized Finance
- Shin'ichiro Matsuo:

Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020. 221-229 - Shigeya Suzuki

:
Multistakeholder Governance for the Internet. 230-241 - Yuta Takanashi:

Future of Finance - From G20 to Practical Implementation of Multi-stakeholder Governance on Blockchain Based Finance. 242-253 - Yuji Suga, Masaki Shimaoka, Masashi Sato, Hirotaka Nakajima:

Securing Cryptocurrency Exchange: Building up Standard from Huge Failures. 254-270
VOTING 2020: Fifth Workshop on Advances in Secure Electronic Voting
- Enka Blanchard

, Ted Selker:
Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification. 273-290 - Oksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud

:
Towards Improving the Efficacy of Code-Based Verification in Internet Voting. 291-309 - Marie-Laure Zollinger

, Peter B. Rønne
, Peter Y. A. Ryan:
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme. 310-318 - Philip B. Stark

:
Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA. 319-336 - Sarah Morin, Grant McClearn, Neal McBurnett

, Poorvi L. Vora, Filip Zagórski
:
A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections. 337-344 - Colin Boyd, Thomas Haines, Peter B. Rønne

:
Vote Selling Resistant Voting. 345-359 - Thomas Haines, Olivier Pereira, Peter B. Rønne

:
Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities. 360-368 - Rolf Haenni, Philipp Locher:

Performance of Shuffling: Taking It to the Limits. 369-385
WTSC 2020: Fourth Workshop on Trusted Smart Contracts
- Monika Di Angelo

, Gernot Salzer
:
Characterizing Types of Smart Contracts in the Ethereum Landscape. 389-404 - Afiya Ayman, Shanto Roy, Amin Alipour, Aron Laszka

:
Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media. 405-422 - Alexander Chepurnoy, Amitabh Saxena:

Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts. 423-435 - Mohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef:

Scalable Open-Vote Network on Ethereum. 436-450 - Jianan Su, Michael Bartholic

, Andrew Stange, Ryosuke Ushida, Shin'ichiro Matsuo:
How to Dynamically Incentivize Sufficient Level of IoT Security. 451-465 - Tatsuo Mitani, Akira Otsuka:

Confidential and Auditable Payments. 466-480 - Somanath Tripathy, Susil Kumar Mohanty:

MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network. 481-495 - Pablo Lamela Seijas

, Alexander Nemish, David Smith, Simon J. Thompson:
Marlowe: Implementing and Analysing Financial Contracts on Blockchain. 496-511 - Naoya Okanami, Ryuya Nakamura, Takashi Nishide:

Load Balancing for Sharded Blockchains. 512-524 - Manuel M. T. Chakravarty, James Chapman, Kenneth MacKenzie, Orestis Melkonian, Michael Peyton Jones, Philip Wadler:

The Extended UTXO Model. 525-539 - Apoorvaa Deshpande, Maurice Herlihy:

Privacy-Preserving Cross-Chain Atomic Swaps. 540-549 - Kumaramangalam Muni Venkateswarlu, Sepideh Avizheh, Reihaneh Safavi-Naini:

A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods. 550-567 - Fausto Spoto

:
Enforcing Determinism of Java Smart Contracts. 568-583 - Bruno Bernardo, Raphaël Cauderlier, Basile Pesin, Julien Tesson:

Albert, An Intermediate Smart-Contract Language for the Tezos Blockchain. 584-598 - Fritz Henglein, Christian Kjær Larsen, Agata Murawska:

A Formally Verified Static Analysis Framework for Compositional Contracts. 599-619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














