Security and usability: the gap in real-world online banking (DOI)
Mohammad Mannan, P. C. van Oorschot
A privacy expectations and security assurance offer system (DOI)
Jeffrey Hunker
Authenticated names (DOI)
Stanley Chow, Christophe Gustave, Dmitri Vinokurov
Security automation considered harmful? (DOI)
W. Keith Edwards, Erika Shehan Poole, Jennifer Stoll
Self-healing: science, engineering, and fiction (DOI)
Michael E. Locasto
The future of biologically-inspired security: is there anything left to learn? (DOI)
Anil Somayaji, Michael Locasto, Jan Feyereisl
Robustly secure computer systems: a new security paradigm of system discontinuity (DOI)
Jon A. Solworth
Information protection via environmental data tethers (DOI)
Matt Beaumont-Gay, Kevin Eustice, Peter Reiher
Position: the user is the enemy (DOI)
S. Vidyaraman, M. Chandrasekaran, S. Upadhyaya
Computing under occupation (DOI)
Klaus Kursawe, Stefan Katzenbeisser
VideoTicket: detecting identity fraud attempts via audiovisual certificates and signatures (DOI)
D. Nali, P. C. van Oorschot, A. Adler