Financial Cryptography and Data Security: FC 2020 International Workshops, Asiausec, Codefi, Voting, and Wtsc, Kota Kinabalu, Malaysia, February 14, 2 » książka
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea.- User-Centered Risk Communication for Safer Browsing.- The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails.- Cue Utilization, Phishing Feature and Phishing Email Detection.- Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences.- Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation.- Understanding Perceptions of Smart Devices.- In Our Employer We Trust: Mental Models of Office Worker’s Privacy Perceptions.- Behaviour of Outsourced Employees as Sources of Information System Security Threats.- Exploring Effects of Auditory Stimuli on CAPTCHA Performance.- PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records.- Empathy as a Response to Frustration in Password Choice.- Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage.- Incorporating Psychology into Cyber Security Education: A Pedagogical Approach.- Effectiveness of multi-stakeholder discussions for decentralized finance: a conference report of CoDeFi 2020.- Multistakeholder Governance for the Internet.- Future of Finance: From G20 to practical implementation of multi-stakeholder governance on blockchain based finance.- Securing Cryptocurrency Exchange: Building up Standard from Huge Failures.- Origami voting: a non-cryptographic approach to transparent ballot verification.- Towards Improving the Efficacy of Code-Based Verification in Internet Voting.- Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme.- Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA.- A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections.- Vote selling resistant voting.- An Update on Marked Mix-Nets: An Attack, A Fix and PQ Possibilities.- Performance of Shuffling: Taking it to the Limits.- Characterizing Types of Smart Contracts in the Ethereum Landscape.- Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media.- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts.- Scalable Open-Vote Network on Ethereum.- How to Dynamically Incentivize Sufficient Level of IoT Securitx.- Confidential and auditable payments.- MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network.- Marlowe: implementing and analysing financial contracts on blockchain.- Load Balancing for Sharded Blockchains.- The Extended UTXO Model.- Privacy-Preserving Cross-Chain Atomic Swaps.- A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods.- Enforcing Determinism of Java Smart Contracts.- Albert, an intermediate smart-contract language for the Tezos blockchain.- A Formally Verified Static Analysis Framework for Compositional Contracts.