Abstract is missing.
- Tale of Two Browsers: Understanding Users' Web Browser Choices in South KoreaJihye Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo. 3-17 [doi]
- User-Centered Risk Communication for Safer BrowsingSanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, L. Jean Camp. 18-35 [doi]
- Secure Email - A Usability StudyAdrian Reuter, Karima Boudaoud, Marco Winckler, Ahmed Abdelmaksoud, Wadie Lemrazzeq. 36-46 [doi]
- The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing EmailsGeorge Nasser, Ben W. Morrison, Piers Bayl-Smith, Ronnie Taib, Michael Gayed, Mark W. Wiggins. 47-55 [doi]
- Cue Utilization, Phishing Feature and Phishing Email DetectionPiers Bayl-Smith, Daniel Sturman, Mark W. Wiggins. 56-70 [doi]
- Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method PreferencesKovila P. L. Coopamootoo. 71-83 [doi]
- Security and Privacy Awareness in Smart Environments - A Cross-Country InvestigationOksana Kulyk, Benjamin Reinheimer, Lukas Aldag, Peter Mayer, Nina Gerber, Melanie Volkamer. 84-101 [doi]
- Understanding Perceptions of Smart DevicesHilda Hadan, Sameer Patil. 102-121 [doi]
- In Our Employer We Trust: Mental Models of Office Workers' Privacy PerceptionsJan Tolsdorf, Florian Dehling. 122-136 [doi]
- Behaviour of Outsourced Employees as Sources of Information System Security ThreatsDavid Oyebisi, Kennedy Njenga. 137-148 [doi]
- Exploring Effects of Auditory Stimuli on CAPTCHA PerformanceBruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik. 149-165 [doi]
- PassPage: Graphical Password Authentication Scheme Based on Web Browsing RecordsXian Chu, Huiping Sun, Zhong Chen 0001. 166-176 [doi]
- Empathy as a Response to Frustration in Password ChoiceKovila P. L. Coopamootoo. 177-191 [doi]
- Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password StorageHarshal Tupsamudre, Monika Sahu, Kumar Vidhani, Sachin Lodha. 192-206 [doi]
- Incorporating Psychology into Cyber Security Education: A Pedagogical ApproachJacqui Taylor-Jackson, John McAlaney, Jeffrey L. Foster, Abubakar Bello, Alana Maurushat, John Dale. 207-217 [doi]
- Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020Shin'ichiro Matsuo. 221-229 [doi]
- Multistakeholder Governance for the InternetShigeya Suzuki. 230-241 [doi]
- Future of Finance - From G20 to Practical Implementation of Multi-stakeholder Governance on Blockchain Based FinanceYuta Takanashi. 242-253 [doi]
- Securing Cryptocurrency Exchange: Building up Standard from Huge FailuresYuji Suga, Masaki Shimaoka, Masashi Sato, Hirotaka Nakajima. 254-270 [doi]
- Origami Voting: A Non-cryptographic Approach to Transparent Ballot VerificationEnka Blanchard, Ted Selker. 273-290 [doi]
- Towards Improving the Efficacy of Code-Based Verification in Internet VotingOksana Kulyk, Melanie Volkamer, Monika Müller, Karen Renaud. 291-309 [doi]
- Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting SchemeMarie-Laure Zollinger, Peter B. Rønne, Peter Y. A. Ryan. 310-318 [doi]
- Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLAPhilip B. Stark. 319-336 [doi]
- A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate ElectionsSarah Morin, Grant McClearn, Neal McBurnett, Poorvi L. Vora, Filip Zagórski. 337-344 [doi]
- Vote Selling Resistant VotingColin Boyd, Thomas Haines, Peter B. Rønne. 345-359 [doi]
- Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ PossibilitiesThomas Haines, Olivier Pereira, Peter B. Rønne. 360-368 [doi]
- Performance of Shuffling: Taking It to the LimitsRolf Haenni, Philipp Locher. 369-385 [doi]
- Characterizing Types of Smart Contracts in the Ethereum LandscapeMonika Di Angelo, Gernot Salzer. 389-404 [doi]
- Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social MediaAfiya Ayman, Shanto Roy, Amin Alipour, Aron Laszka. 405-422 [doi]
- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart ContractsAlexander Chepurnoy, Amitabh Saxena. 423-435 [doi]
- Scalable Open-Vote Network on EthereumMohamed Seifelnasr, Hisham S. Galal, Amr M. Youssef. 436-450 [doi]
- How to Dynamically Incentivize Sufficient Level of IoT SecurityJianan Su, Michael Bartholic, Andrew Stange, Ryosuke Ushida, Shin'ichiro Matsuo. 451-465 [doi]
- Confidential and Auditable PaymentsTatsuo Mitani, Akira Otsuka. 466-480 [doi]
- MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel NetworkSomanath Tripathy, Susil Kumar Mohanty. 481-495 [doi]
- Marlowe: Implementing and Analysing Financial Contracts on BlockchainPablo Lamela Seijas, Alexander Nemish, David Smith, Simon J. Thompson. 496-511 [doi]
- Load Balancing for Sharded BlockchainsNaoya Okanami, Ryuya Nakamura, Takashi Nishide. 512-524 [doi]
- The Extended UTXO ModelManuel M. T. Chakravarty, James Chapman 0001, Kenneth Mackenzie, Orestis Melkonian, Michael Peyton Jones, Philip Wadler. 525-539 [doi]
- Privacy-Preserving Cross-Chain Atomic SwapsApoorvaa Deshpande, Maurice Herlihy. 540-549 [doi]
- A Blockchain Based Approach to Resource Sharing in Smart NeighbourhoodsKumaramangalam Muni Venkateswarlu, Sepideh Avizheh, Reihaneh Safavi-Naini. 550-567 [doi]
- Enforcing Determinism of Java Smart ContractsFausto Spoto. 568-583 [doi]
- Albert, An Intermediate Smart-Contract Language for the Tezos BlockchainBruno Bernardo, Raphaël Cauderlier, Basile Pesin, Julien Tesson. 584-598 [doi]
- A Formally Verified Static Analysis Framework for Compositional ContractsFritz Henglein, Christian Kjær Larsen, Agata Murawska. 599-619 [doi]