Financial Cryptography Workshops最新文献

筛选
英文 中文
Securing Cryptocurrency Exchange: Building up Standard from Huge Failures 保护加密货币交换:从巨大的失败中建立标准
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_19
Yuji Suga, Masaki Shimaoka, Masashi Sato, Hirotaka Nakajima
{"title":"Securing Cryptocurrency Exchange: Building up Standard from Huge Failures","authors":"Yuji Suga, Masaki Shimaoka, Masashi Sato, Hirotaka Nakajima","doi":"10.1007/978-3-030-54455-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_19","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132055454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User-Centered Risk Communication for Safer Browsing 以用户为中心的风险沟通促进更安全的浏览
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.2139/ssrn.3534856
Sanchari Das, Sanchari Das, Jacob Abbott, S. Gopavaram, J. Blythe, L. Camp
{"title":"User-Centered Risk Communication for Safer Browsing","authors":"Sanchari Das, Sanchari Das, Jacob Abbott, S. Gopavaram, J. Blythe, L. Camp","doi":"10.2139/ssrn.3534856","DOIUrl":"https://doi.org/10.2139/ssrn.3534856","url":null,"abstract":"Solutions to phishing have included training users, stand-alone warnings, and automatic blocking. We integrated personalized blocking, filtering, and alerts into a single holistic risk-management tool, which leverages simple metaphorical cartoons that function both as risk communication and controls for browser settings. We tested the tool in two experiments. The first experiment was a four-week naturalistic study where we examined the acceptability and usability of the tool. The experimental group was exposed to fewer risks in that they chose to run fewer scripts, disabled most iFrames, blocked Flash, decreased tracking, and quickly identified each newly encountered website as unfamiliar. Each week participants increased their tool use. Conversely, those in the control group expressed perceptions of lower risk, while enabling more potentially malicious processes. We then tested phishing resilience in the laboratory with newly recruited participants. The results showed that the tool significantly improved participants’ ability to distinguish between legitimate and phishing sites.","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121901939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails 线索利用和认知负荷在网络钓鱼邮件检测中的作用
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_4
George Nasser, Ben W. Morrison, Piers Bayl-Smith, R. Taib, Michael Gayed, M. Wiggins
{"title":"The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails","authors":"George Nasser, Ben W. Morrison, Piers Bayl-Smith, R. Taib, Michael Gayed, M. Wiggins","doi":"10.1007/978-3-030-54455-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_4","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"53 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124649134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
In Our Employer We Trust: Mental Models of Office Workers' Privacy Perceptions 在我们信任的雇主中:办公室员工隐私感知的心理模型
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_9
Jan Tolsdorf, Florian Dehling
{"title":"In Our Employer We Trust: Mental Models of Office Workers' Privacy Perceptions","authors":"Jan Tolsdorf, Florian Dehling","doi":"10.1007/978-3-030-54455-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_9","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"45 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122952579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enforcing Determinism of Java Smart Contracts 强制Java智能合约的确定性
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_40
F. Spoto
{"title":"Enforcing Determinism of Java Smart Contracts","authors":"F. Spoto","doi":"10.1007/978-3-030-54455-3_40","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_40","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130105813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Vote Selling Resistant Voting 卖票抵制投票
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_25
C. Boyd, Thomas Haines, P. B. Rønne
{"title":"Vote Selling Resistant Voting","authors":"C. Boyd, Thomas Haines, P. B. Rønne","doi":"10.1007/978-3-030-54455-3_25","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_25","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121380985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Shuffling: Taking It to the Limits 洗牌的表现:达到极限
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_27
R. Haenni, Philipp Locher
{"title":"Performance of Shuffling: Taking It to the Limits","authors":"R. Haenni, Philipp Locher","doi":"10.1007/978-3-030-54455-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_27","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114896508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea 两种浏览器的故事:了解韩国用户的浏览器选择
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_1
Ji-Woon Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo
{"title":"Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea","authors":"Ji-Woon Woo, Ji-Won Choi, Soyoon Jeon, Joon Kuy Han, Hyoungshick Kim, Simon S. Woo","doi":"10.1007/978-3-030-54455-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_1","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133989410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multistakeholder Governance for the Internet 互联网的多利益主体治理
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_17
Shigeya Suzuki
{"title":"Multistakeholder Governance for the Internet","authors":"Shigeya Suzuki","doi":"10.1007/978-3-030-54455-3_17","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_17","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133358962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Dynamically Incentivize Sufficient Level of IoT Security 如何动态激励足够的物联网安全水平
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_32
Jianan Su, Michael Bartholic, Andrew Stange, Ryosuke Ushida, Shin'ichiro Matsuo
{"title":"How to Dynamically Incentivize Sufficient Level of IoT Security","authors":"Jianan Su, Michael Bartholic, Andrew Stange, Ryosuke Ushida, Shin'ichiro Matsuo","doi":"10.1007/978-3-030-54455-3_32","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_32","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信