Joseph Bonneau
Orcid: 0000-0002-6349-0145Affiliations:
- New York University, NY, USA
- Stanford University, CA, USA (former)
According to our database1,
Joseph Bonneau
authored at least 88 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on jbonneau.com
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
Good things come to those who wait: Dishonest-Majority Coin-Flipping Requires Delay Functions.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools.
Proc. ACM Hum. Comput. Interact., April, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Found. Trends Netw., 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Princeton University Press, ISBN: 978-0-691-17169-2, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google.
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Security Protocols XXII, 2014
FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the second ACM conference on Online social networks, 2014
2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Security Protocols XX, 2012
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Proceedings of the Security Protocols XIX, 2011
Proceedings of the Security Protocols XIX, 2011
Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords.
Proceedings of the Security Protocols XIX, 2011
2010
Proceedings of the 3rd Workshop on Online Social Networks, 2010
The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009
Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 2009
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006