Yee-Yin Choong, Mary Theofanos (NIST); Karen Renaud, Suzanne Prior (Abertay University)
Case Study – Exploring Children’s Password Knowledge and Practices
View More Papers
Analyzing the Patterns and Behavior of Users When Detecting...
Nick Ceccio, Naman Gupta, Majed Almansoori, Rahul Chatterjee (University of Wisconsin-Madison)
Read MoreExploring Phishing Threats through QR Codes in Naturalistic Settings
Filipo Sharevski (DePaul University), Mattia Mossano, Maxime Fabian Veit, Gunther Schiefer, Melanie Volkamer (Karlsruhe Institute of Technology)
Read MoreReplication: Do We Snooze If We Can't Lose? Modelling...
Karoline Busse (University of Bonn); Dominik Wermke (Leibniz University Hannover); Sabrina Amft (University of Bonn); Sascha Fahl (Leibniz University Hannover); Emanuel von Zezschwitz, Matthew Smith (University of Bonn)
Read MoreUsability of Cryptocurrency Wallets Providing CoinJoin Transactions
Simin Ghesmati (Uni Wien, SBA Research), Walid Fdhila (Uni Wien, SBA Research), Edgar Weippl (Uni Wien, SBA Research)
Read More