No abstract available.
Cited By
- Nicholson J, Coventry L and Briggs P Introducing the cybersurvival task Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security, (427-441)
- Trono J (2018). CS1 programming assignments that can help to increase awareness of cybersecurity issues, Journal of Computing Sciences in Colleges, 34:2, (80-86), Online publication date: 1-Dec-2018.
- Mayer P, Kunz A and Volkamer M Reliable Behavioural Factors in the Information Security Context Proceedings of the 12th International Conference on Availability, Reliability and Security, (1-10)
- Beris O, Beautement A and Sasse M Employee Rule Breakers, Excuse Makers and Security Champions: Proceedings of the 2015 New Security Paradigms Workshop, (73-84)
- Nostro N, Ceccarelli A, Bondavalli A and Brancati F (2014). Insider Threat Assessment, ACM SIGOPS Operating Systems Review, 48:2, (3-12), Online publication date: 5-Dec-2014.
- Leitner M and Rinderle-Ma S (2014). A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions, Information and Software Technology, 56:3, (273-293), Online publication date: 1-Mar-2014.
- Nostro N, Ceccarelli A, Bondavalli A and Brancati F A methodology and supporting techniques for the quantitative assessment of insider threats Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, (1-6)
- Kordy B, Mauw S, Melissen M and Schweitzer P Attack-defense trees and two-player binary zero-sum extensive form games are equivalent Proceedings of the First international conference on Decision and game theory for security, (245-256)
- Edwards W, Poole E and Stoll J Security automation considered harmful? Proceedings of the 2007 Workshop on New Security Paradigms, (33-42)
- Gross J and Rosson M Looking for trouble Proceedings of the 2007 symposium on Computer human interaction for the management of information technology, (10-es)
- Toledano D, Fernández Pozo R, Hernández Trapote Á and Hernández Gómez L (2019). Usability evaluation of multi-modal biometric verification systems, Interacting with Computers, 18:5, (1101-1122), Online publication date: 1-Sep-2006.
- Flechais I, Riegelsberger J and Sasse M Divide and conquer Proceedings of the 2005 workshop on New security paradigms, (33-41)
- De Palma P, Frank C, Gladfelter S and Holden J (2004). Cryptography and computer security for undergraduates, ACM SIGCSE Bulletin, 36:1, (94-95), Online publication date: 1-Mar-2004.
- Wright T (2004). Security, privacy, and anonymity, XRDS: Crossroads, The ACM Magazine for Students, 11:2, (5-5), Online publication date: 1-Dec-2004.
- De Palma P, Frank C, Gladfelter S and Holden J Cryptography and computer security for undergraduates Proceedings of the 35th SIGCSE technical symposium on Computer science education, (94-95)
- Khare R and Taylor R Extending the Representational State Transfer (REST) Architectural Style for Decentralized Systems Proceedings of the 26th International Conference on Software Engineering, (428-437)
- Payne C Enhanced Security Models for Operating Systems Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01, (230-235)
- Gelbord B On the use of PKI technologies for secure and private e-learning environments Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning, (568-572)
- Ince D (2019). Eight Desert Island Books, Automated Software Engineering, 8:3-4, (355-358), Online publication date: 1-Aug-2001.
- Brostoff S and Sasse M Safe and sound Proceedings of the 2001 workshop on New security paradigms, (41-50)
- Weirich D and Sasse M Persuasive password security CHI '01 Extended Abstracts on Human Factors in Computing Systems, (139-140)
- Salter C, Saydjari O, Schneier B and Wallner J Toward a secure system engineering methodolgy Proceedings of the 1998 workshop on New security paradigms, (2-10)
Recommendations
Sharing one secret vs. sharing many secrets
A secret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. A multi-secret sharing ...
White Lies
In this paper we distinguish between two types of white lies: those that help others at the expense of the person telling the lie, which we term altruistic white lies, and those that help both others and the liar, which we term Pareto white lies. We ...
White lies
BQGT '10: Proceedings of the Behavioral and Quantitative Game Theory: Conference on Future DirectionsWhen do people tell white lies? In this paper we distinguish between two types of white lies: those that help others at the expense of the person telling the lie, which we term altruistic white lies, and those that help both others and the liar, which ...