2020
Social Engineering Resistant 2FA.
CoRR, 2020
2019
Lessons Learned Developing a Visual Analytics Solution for Investigative Analysis of Scamming Activities.
IEEE Trans. Vis. Comput. Graph., 2019
The Rising Threat of Launchpad Attacks.
IEEE Secur. Priv., 2019
2018
Secure Remote Attestation.
IACR Cryptol. ePrint Arch., 2018
2017
Mind your SMSes: Mitigating social engineering in second factor authentication.
Comput. Secur., 2017
Short Paper: Addressing Sophisticated Email Attacks.
Proceedings of the Financial Cryptography and Data Security, 2017
Breaking and fixing content-based filtering.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
2016
User trust assessment: a new approach to combat deception.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention.
Proceedings of the New Codebreakers, 2016
Case Study: Romance Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Traditional Countermeasures to Unwanted Email.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Case Study: Rental Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Identifying Scams and Trends.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Conclusion and Next Steps.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Case Study: Business Email Compromise.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Semantic Analysis of Messages.
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Obfuscation in Spam and Scam.
Proceedings of the Understanding Social Engineering Based Scams, 2016
2014
Hand authentication on multi-touch tablets.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
Mobile Authentication - Problems and Solutions.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-4878-5, 2013
2012
The Future of Authentication.
IEEE Secur. Priv., 2012
The Benefits of Understanding Passwords.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Improved Visual Preference Authentication.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
2010
Proceedings of the Handbook of Financial Cryptography and Security., 2010
Deterring voluntary trace disclosure in re-encryption mix-networks.
ACM Trans. Inf. Syst. Secur., 2010
Retroactive Detection of Malware with Applications to Mobile Platforms.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Implicit Authentication through Learning User Behavior.
Proceedings of the Information Security - 13th International Conference, 2010
Authentication in the clouds: a framework and its application to mobile users.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Server-side detection of malware infection.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Why and How to Perform Fraud Experiments.
IEEE Secur. Priv., 2008
Using Cartoons to Teach Internet Security.
Cryptologia, 2008
Making CAPTCHAs clickable.
Proceedings of the 9th Workshop on Mobile Computing Systems and Applications, 2008
The Threat of Political Phishing.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
Quantifying the security of preference-based authentication.
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Designing ethical phishing experiments.
IEEE Technol. Soc. Mag., 2007
Delayed password disclosure.
SIGACT News, 2007
Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks.
IEEE Secur. Priv., 2007
Combating Click Fraud via Premium Clicks.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
What Instills Trust? A Qualitative Study of Phishing.
Proceedings of the Financial Cryptography and Data Security, 2007
Phishing IQ Tests Measure Fear, Not Ability.
Proceedings of the Financial Cryptography and Data Security, 2007
Virtual Worlds and Fraud: Approaching Cybersecurity in Massively Multiplayer Online Games.
Proceedings of the 2007 DiGRA International Conference: Situated Play, 2007
2006
Node Cooperation in Hybrid Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006
Threshold Password-Authenticated Key Exchange.
J. Cryptol., 2006
Warkitting: The Drive-by Subversion of Wireless Home Routers.
J. Digit. Forensic Pract., 2006
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories.
J. Digit. Forensic Pract., 2006
Invasive browser sniffing and countermeasures.
Proceedings of the 15th international conference on World Wide Web, 2006
Designing ethical phishing experiments: a study of (ROT13) rOnl query features.
Proceedings of the 15th international conference on World Wide Web, 2006
Cache Cookies for Browser Authentication (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Discount Anonymous On Demand Routing for Mobile Ad hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions.
Proceedings of IEEE International Conference on Communications, 2006
Auditable Privacy: On Tamper-Evident Mix Networks.
Proceedings of the Financial Cryptography and Data Security, 2006
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Trust Establishment in Data Sharing: An Incentive Model for Biodiversity Information Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
Reputation-based Wi-Fi deployment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005
Privacy-Preserving Polling using Playing Cards.
IACR Cryptol. ePrint Arch., 2005
Distributed Phishing Attacks.
IACR Cryptol. ePrint Arch., 2005
Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware.
IACR Cryptol. ePrint Arch., 2005
Specifying Patterns for Mobile Application Domain Using General Architectural Components.
Proceedings of the Product Focused Software Process Improvement, 2005
Balancing auditability and privacy in vehicular networks.
Proceedings of the Q2SWinet'05, 2005
Modeling and Preventing Phishing Attacks.
Proceedings of the Financial Cryptography and Data Security, 2005
A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005
Quantifying Security in Hybrid Cellular Networks.
Proceedings of the Applied Cryptography and Network Security, 2005
Efficient Constructions for One-Way Hash Chains.
Proceedings of the Applied Cryptography and Network Security, 2005
Messin' with Texas Deriving Mother's Maiden Names Using Public Records.
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Reputation-based Wi-Fi deployment protocols and security analysis.
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004
Stealth attacks in vehicular technologies.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004
Efficient attribute authentication with applications to ad hoc networks.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004
Universal Re-encryption for Mixnets.
Proceedings of the Topics in Cryptology, 2004
2003
Untraceable Email Cluster Bombs.
login Usenix Mag., 2003
How to Protect Against a Militant Spammer.
IACR Cryptol. ePrint Arch., 2003
Cryptographic Randomized Response Techniques.
IACR Cryptol. ePrint Arch., 2003
Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service
CoRR, 2003
Reusable anonymous return channels.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Proceedings of the Financial Cryptography, 2003
Fractal Merkle Tree Representation and Traversal.
Proceedings of the Topics in Cryptology, 2003
2002
Coercion-Resistant Electronic Elections.
IACR Cryptol. ePrint Arch., 2002
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking.
IACR Cryptol. ePrint Arch., 2002
Fractal Hash Sequence Representation and Traversal.
IACR Cryptol. ePrint Arch., 2002
Almost Optimal Hash Sequence Traversal.
IACR Cryptol. ePrint Arch., 2002
Financial Instruments in Recommendation Mechanisms.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Timed Release of Standard Digital Signatures.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proprietary Certificates.
Proceedings of the Topics in Cryptology, 2002
Theft-Protected Proprietary Certificates.
Proceedings of the Security and Privacy in Digital Rights Management, 2002
IntelliShopper: a proactive, personal, private shopping assistant.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
Optimistic Mixing for Exit-Polls.
Proceedings of the Advances in Cryptology, 2002
2001
An optimally robust hybrid mix network.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Secure Server-Aided Signature Generation.
Proceedings of the Public Key Cryptography, 2001
Mutual Authentication for Low-Power Mobile Devices.
Proceedings of the Financial Cryptography, 2001
Security Weaknesses in Bluetooth.
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Topics in Cryptology, 2001
Discouraging Software Piracy Using Software Aging.
Proceedings of the Security and Privacy in Digital Rights Management, 2001
2000
How to turn loaded dice into fair coins.
IEEE Trans. Inf. Theory, 2000
Privacy-preserving global customization.
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC-00), 2000
Cryptographic Approaches to Provacy in Forensic DNA Databases.
Proceedings of the Public Key Cryptography, 2000
Security of Signed ElGamal Encryption.
Proceedings of the Advances in Cryptology, 2000
Addition of ElGamal Plaintexts.
Proceedings of the Advances in Cryptology, 2000
Mix and Match: Secure Function Evaluation via Ciphertexts.
Proceedings of the Advances in Cryptology, 2000
1999
Secure and Lightweight Advertising on the Web.
Comput. Networks, 1999
Proceedings of the STACS 99, 1999
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999
Mini-Cash: A Minimalistic Approach to E-Commerce.
Proceedings of the Public Key Cryptography, 1999
On Quorum Controlled Asymmetric Proxy Re-encryption.
Proceedings of the Public Key Cryptography, 1999
Scramble All, Encrypt Small.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Improved Magic Ink Signatures Using Hints.
Proceedings of the Financial Cryptography, 1999
Abuse-Free Optimistic Contract Signing.
Proceedings of the Advances in Cryptology, 1999
Electronic Payments: Where Do We Go from Here?.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Efficient Oblivious Proofs of Correct Exponentiation.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
Proofs of Work and Bread Pudding Protocols.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1998
Mix-Based Electronic Payments.
Proceedings of the Selected Areas in Cryptography '98, 1998
On Assurance Structures for WWW Commerce.
Proceedings of the Financial Cryptography, 1998
X-Cash: Executable Digital Cash.
Proceedings of the Financial Cryptography, 1998
Curbing Junk E-Mail via Secure Classification.
Proceedings of the Financial Cryptography, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
A Practical Secure Physical Random Bit Generator.
Proceedings of the CCS '98, 1998
1997
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
IACR Cryptol. ePrint Arch., 1997
Applying Anti-Trust Policies to Increase Trust in a Versatile E-Money System.
Proceedings of the Financial Cryptography, 1997
Distributed "Magic Ink" Signatures.
Proceedings of the Advances in Cryptology, 1997
Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997
1996
Designated Verifier Proofs and Their Applications.
Proceedings of the Advances in Cryptology, 1996
Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers.
Proceedings of the Advances in Cryptology, 1996
Revokable and Versatile Electronic Money (extended abstract).
Proceedings of the CCS '96, 1996
1995
Ripping Coins For a Fair Exchange.
Proceedings of the Advances in Cryptology, 1995
1994
Blackmailing using Undeniable Signatures.
Proceedings of the Advances in Cryptology, 1994