NSPW C

15 papers

YearTitle / Authors
2013Booby trapping software.
Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz
2013Can we sell security like soap?: a new approach to behaviour change.
Debi Ashenden, Darren Lawrence
2013Designing forensic analysis techniques through anthropology.
Sathya Chandran Sundaramurthy
2013Detecting hidden enemy lines in IP address space.
Suhas Mathur, Baris Coskun, Suhrid Balakrishnan
2013Explicit authentication response considered harmful.
Lianying Zhao, Mohammad Mannan
2013Forgive and forget: return to obscurity.
Matt Bishop, Emily Rine Butler, Kevin R. B. Butler, Carrie Gates, Steven Greenspan
2013Go with the flow: toward workflow-oriented security assessment.
Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau
2013Information behaving badly.
Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun
2013Markets for zero-day exploits: ethics and implications.
Serge Egelman, Cormac Herley, Paul C. van Oorschot
2013NSPHD: the polyglot computer.
Daniel Medeiros Nunes de Castro
2013New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013
Mary Ellen Zurko, Konstantin Beznosov, Tara Whalen, Tom Longstaff
2013Principles of authentication.
Sean Peisert, Edward B. Talbot, Tom M. Kroeger
2013Towards narrative authentication: or, against boring authentication.
Anil Somayaji, David Mould, Carson Brown
2013Towards the realization of a public health system for shared secure cyber-space.
Jeff Rowe, Karl N. Levitt, Mike Hogarth
2013Useful password hashing: how to waste computing cycles with style.
Markus Dürmuth