What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michelle L. Mazurek
Google Scholar
80
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Characterizing the Usability and Usefulness of U.S. Ad Transparency Systems.
Kevin Bryson
Arthur Borem
Phoebe Moh
Omer Akgul
Laura Edelson
Tobias Lauinger
Michelle L. Mazurek
Damon McCoy
Blase Ur
2025
conf/soups
Safety Perceptions of Generative AI Conversational Agents: Uncovering Perceptual Differences in Trust, Risk, and Fairness.
Jan Tolsdorf
Alan F. Luo
Monica Kodwani
Junho Eum
Mahmood Sharif
Michelle L. Mazurek
Adam J. Aviv
2025
conf/soups
Do You See If I See? Investigating Reciprocity in Interpersonal Access-Control Settings (in the U.S.).
Nathan Malkin
Alan F. Luo
Evan J. Zhao
Michelle L. Mazurek
2025
conf/uss
As Advertised? Understanding the Impact of Influencer VPN Ads.
Omer Akgul
Richard Roberts
Emma Shroyer
Dave Levin
Michelle L. Mazurek
2025
conf/uss
How Researchers De-Identify Data in Practice.
Wentao Guo
Paige Pepitone
Adam J. Aviv
Michelle L. Mazurek
2024
journals/popets
What Does It Mean to Be Creepy? Responses to Visualizations of Personal Browsing Activity, Online Tracking, and Targeted Ads.
Nathan Reitinger
Bruce Wen
Michelle L. Mazurek
Blase Ur
2024
conf/ccs
A Qualitative Analysis of Practical De-Identification Guides.
Wentao Guo
Aditya Kishore
Adam J. Aviv
Michelle L. Mazurek
2024
conf/uss
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends.
Omer Akgul
Sai Teja Peddinti
Nina Taft
Michelle L. Mazurek
Hamza Harkous
Animesh Srivastava
Benoit Seguin
2024
conf/uss
Data Subjects' Reactions to Exercising Their Right of Access.
Arthur Borem
Elleen Pan
Olufunmilola Obielodan
Aurelie Roubinowitz
Luca Dovichi
Michelle L. Mazurek
Blase Ur
2024
conf/sp
SoK: Safer Digital-Safety Research Involving At-Risk Users.
Rosanna Bellini
Emily Tseng
Noel Warford
Alaa Daffalla
Tara Matthews
Sunny Consolvo
Jill Palzkill Woelfer
Patrick Gage Kelley
Michelle L. Mazurek
Dana Cuomo
Nicola Dell
Thomas Ristenpart
2024
conf/soups
A Survey of Cybersecurity Professionals' Perceptions and Experiences of Safety and Belonging in the Community.
Samantha Katcher
Liana Wang
Caroline Yang
Chloé Messdaghi
Michelle L. Mazurek
Marshini Chetty
Kelsey R. Fulton
Daniel Votipka
2024
conf/soups
Write, Read, or Fix? Exploring Alternative Methods for Secure Development Studies.
Kelsey R. Fulton
Joseph Lewis
Nathan Malkin
Michelle L. Mazurek
2024
conf/soups
Understanding How People Share Passwords.
Phoebe Moh
Andrew Yang
Nathan Malkin
Michelle L. Mazurek
2024
conf/soups
How Entertainment Journalists Manage Online Hate and Harassment.
Noel Warford
Nicholas Farber
Michelle L. Mazurek
2024
conf/soups
"I can say I'm John Travolta...but I'm not John Travolta": Investigating the Impact of Changes to Social Media Verification Policies on User Perceptions of Verified Accounts.
Carson Powers
Nickolas Gravel
Christopher Pellegrini
Micah Sherr
Michelle L. Mazurek
Daniel Votipka
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
journals/popets
Editors' Introduction.
Michelle L. Mazurek
Micah Sherr
2023
conf/uss
The Role of Professional Product Reviewers in Evaluating Security and Privacy.
Wentao Guo
Jason Walter
Michelle L. Mazurek
2023
conf/uss
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Omer Akgul
Taha Eghtesad
Amit Elazari
Omprakash Gnawali
Jens Grossklags
Michelle L. Mazurek
Daniel Votipka
Aron Laszka
2023
conf/uss
How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities.
Alan F. Luo
Noel Warford
Samuel Dooley
Rachel Greenstadt
Michelle L. Mazurek
Nora McDonald
2023
conf/sp
Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery.
Kelsey R. Fulton
Samantha Katcher
Kevin Song
Marshini Chetty
Michelle L. Mazurek
Chloé Messdaghi
Daniel Votipka
2023
conf/sp
Characterizing Everyday Misuse of Smart Home Devices.
Phoebe Moh
Pubali Datta
Noel Warford
Adam Bates
Nathan Malkin
Michelle L. Mazurek
2023
conf/sp
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging.
Nathan Reitinger
Nathan Malkin
Omer Akgul
Michelle L. Mazurek
Ian Miers
2023
conf/sp
Optimistic Access Control for the Smart Home.
Nathan Malkin
Alan F. Luo
Julio Poveda
Michelle L. Mazurek
2022
journals/popets
Editors' Introduction.
Florian Kerschbaum
Michelle L. Mazurek
2022
journals/popets
Editors' Introduction.
Florian Kerschbaum
Michelle L. Mazurek
2022
journals/popets
Editors' Introduction.
Florian Kerschbaum
Michelle L. Mazurek
2022
journals/popets
Editors' Introduction.
Florian Kerschbaum
Michelle L. Mazurek
2022
conf/ccs
We Are the Experts, and We Are the Problem: The Security Advice Fiasco.
Michelle L. Mazurek
2022
conf/ccs
Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.
Kelsey R. Fulton
Daniel Votipka
Desiree Abrokwa
Michelle L. Mazurek
Michael Hicks
James Parker
2022
conf/uss
Why Users (Don't) Use Password Managers at a Large Educational Institution.
Peter Mayer
Collins W. Munyendo
Michelle L. Mazurek
Adam J. Aviv
2022
conf/sp
SoK: A Framework for Unifying At-Risk User Research.
Noel Warford
Tara Matthews
Kaitlyn Yang
Omer Akgul
Sunny Consolvo
Patrick Gage Kelley
Nathan Malkin
Michelle L. Mazurek
Manya Sleeper
Kurt Thomas
2022
conf/sp
Investigating Influencer VPN Ads on YouTube.
Omer Akgul
Richard Roberts
Moses Namara
Dave Levin
Michelle L. Mazurek
2022
conf/ndss
Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Rock Stevens
Faris Bugra Kokulu
Adam Doupé
Michelle L. Mazurek
2021
journals/popets
ML-CB: Machine Learning Canvas Block.
Nathan Reitinger
Michelle L. Mazurek
2021
conf/uss
"It's stressful having all these phones": Investigating Sex Workers' Safety Goals, Risks, and Practices Online.
Allison McDonald
Catherine Barwulor
Michelle L. Mazurek
Florian Schaub
Elissa M. Redmiles
2021
conf/uss
Strategies and Perceived Risks of Sending Sensitive Documents.
Noel Warford
Collins W. Munyendo
Ashna Mediratta
Adam J. Aviv
Michelle L. Mazurek
2021
conf/uss
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption.
Omer Akgul
Wei Bai
Shruti Das
Michelle L. Mazurek
2021
conf/sp
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises.
Daniel Votipka
Eric Zhang
Michelle L. Mazurek
2021
conf/soups
Benefits and Drawbacks of Adopting a Secure Programming Language: Rust as a Case Study.
Kelsey R. Fulton
Anna Chan
Daniel Votipka
Michael Hicks
Michelle L. Mazurek
2021
conf/soups
Pursuing Usable and Useful Data Downloads Under GDPR/CCPA Access Rights via Co-Design.
Sophie Veys
Daniel Serrano
Madison Stamos
Margot Herman
Nathan Reitinger
Michelle L. Mazurek
Blase Ur
2021
conf/soups
Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and Smart-Speaker Platforms.
Desiree Abrokwa
Shruti Das
Omer Akgul
Michelle L. Mazurek
2021
conf/eurosp
An Investigation of Online Reverse Engineering Community Discussions in the Context of Ghidra.
Daniel Votipka
Mary Nicole Dugay Punzalan
Seth M. Rabin
Yla R. Tausczik
Michelle L. Mazurek
2020
conf/uss
An Observational Investigation of Reverse Engineers' Processes.
Daniel Votipka
Seth M. Rabin
Kristopher K. Micinski
Jeffrey S. Foster
Michelle L. Mazurek
2020
conf/uss
What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data.
Miranda Wei
Madison Stamos
Sophie Veys
Nathan Reitinger
Justin Goodman
Margot Herman
Dorota Filipczuk
Ben Weinshel
Michelle L. Mazurek
Blase Ur
2020
conf/uss
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.
Elissa M. Redmiles
Noel Warford
Amritha Jayanti
Aravind Koneru
Sean Kross
Miraida Morales
Rock Stevens
Michelle L. Mazurek
2020
conf/uss
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It.
Daniel Votipka
Kelsey R. Fulton
James Parker
Matthew Hou
Michelle L. Mazurek
Michael Hicks
2020
conf/eurosp
Improving Non-Experts' Understanding of End-to-End Encryption: An Exploratory Study.
Wei Bai
Michael Pearson
Patrick Gage Kelley
Michelle L. Mazurek
2020
conf/eurosp
User Attitudes On Direct-to-Consumer Genetic Testing.
Debjani Saha
Anna Chan
Brook Stacy
Kiran Javkar
Sushant Patkar
Michelle L. Mazurek
2020
conf/ndss
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Rock Stevens
Josiah Dykstra
Wendy Knox Everette
James Chapman
Garrett Bladow
Alexander Farmer
Kevin Halliday
Michelle L. Mazurek
2019
conf/ccs
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Ben Weinshel
Miranda Wei
Mainack Mondal
Euirim Choi
Shawn Shan
Claire Dolin
Michelle L. Mazurek
Blase Ur
2019
conf/sp
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples.
Elissa M. Redmiles
Sean Kross
Michelle L. Mazurek
2019
conf/soups
The Effect of Entertainment Media on Mental Models of Computer Security.
Kelsey R. Fulton
Rebecca Gelles
Alexandra McKay
Yasmin Abdi
Richard Roberts
Michelle L. Mazurek
2018
journals/popets
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Michael Freyberger
Warren He
Devdatta Akhawe
Michelle L. Mazurek
Prateek Mittal
2018
conf/ccs
Asking for a Friend: Evaluating Response Biases in Security User Studies.
Elissa M. Redmiles
Ziyun Zhu
Sean Kross
Dhruv Kuchhal
Tudor Dumitras
Michelle L. Mazurek
2018
conf/ccs
Equitable Security: Optimizing Distribution of Nudges and Resources.
Elissa M. Redmiles
John P. Dickerson
Krishna P. Gummadi
Michelle L. Mazurek
2018
conf/uss
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level.
Rock Stevens
Daniel Votipka
Elissa M. Redmiles
Colin Ahern
Patrick Sweeney
Michelle L. Mazurek
2018
conf/sp
Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes.
Daniel Votipka
Rock Stevens
Elissa M. Redmiles
Jeremy Hu
Michelle L. Mazurek
2018
conf/soups
User Comfort with Android Background Resource Accesses in Different Contexts.
Daniel Votipka
Seth M. Rabin
Kristopher K. Micinski
Thomas Gilray
Michelle L. Mazurek
Jeffrey S. Foster
2018
conf/eurosp
Understanding User Tradeoffs for Search in Encrypted Communication.
Wei Bai
Ciara Lynton
Charalampos Papamanthou
Michelle L. Mazurek
2017
conf/uss
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Christian Stransky
Yasemin Acar
Duc Cuong Nguyen
Dominik Wermke
Doowon Kim
Elissa M. Redmiles
Michael Backes
Simson L. Garfinkel
Michelle L. Mazurek
Sascha Fahl
2017
conf/uss
Exploring User Perceptions of Discrimination in Online Targeted Advertising.
Angelisa C. Plane
Elissa M. Redmiles
Michelle L. Mazurek
Michael Carl Tschantz
2017
conf/sp
Comparing the Usability of Cryptographic APIs.
Yasemin Acar
Michael Backes
Sascha Fahl
Simson L. Garfinkel
Doowon Kim
Michelle L. Mazurek
Christian Stransky
2017
conf/soups
Diversify to Survive: Making Passwords Stronger with Adaptive Policies.
Sean M. Segreti
William Melicher
Saranga Komanduri
Darya Melicher
Richard Shay
Blase Ur
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Michelle L. Mazurek
2017
conf/soups
Security Developer Studies with GitHub Users: Exploring a Convenience Sample.
Yasemin Acar
Christian Stransky
Dominik Wermke
Michelle L. Mazurek
Sascha Fahl
2017
conf/soups
You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.
Elissa M. Redmiles
Everest Liu
Michelle L. Mazurek
2016
conf/ccs
Build It, Break It, Fix It: Contesting Secure Development.
Andrew Ruef
Michael W. Hicks
James Parker
Dave Levin
Michelle L. Mazurek
Piotr Mardziel
2016
conf/ccs
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior.
Elissa M. Redmiles
Sean Kross
Michelle L. Mazurek
2016
conf/sp
I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security.
Elissa M. Redmiles
Amelia R. Malone
Michelle L. Mazurek
2016
conf/sp
You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Yasemin Acar
Michael Backes
Sascha Fahl
Doowon Kim
Michelle L. Mazurek
Christian Stransky
2016
conf/soups
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
Wei Bai
Moses Namara
Yichen Qian
Patrick Gage Kelley
Michelle L. Mazurek
Doowon Kim
2015
conf/uss
Measuring Real-World Accuracies and Biases in Modeling Password Guessability.
Blase Ur
Sean M. Segreti
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Saranga Komanduri
Darya Kurilova
Michelle L. Mazurek
William Melicher
Richard Shay
2013
conf/ccs
Measuring password guessability for an entire university.
Michelle L. Mazurek
Saranga Komanduri
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Patrick Gage Kelley
Richard Shay
Blase Ur
2013
conf/fc
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/uss
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Blase Ur
Patrick Gage Kelley
Saranga Komanduri
Joel Lee
Michael Maass
Michelle L. Mazurek
Timothy Passaro
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2012
conf/sp
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Richard Shay
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Julio C. López
2012
conf/soups
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Richard Shay
Patrick Gage Kelley
Saranga Komanduri
Michelle L. Mazurek
Blase Ur
Timothy Vidas
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
2010
conf/soups
Encountering stronger password requirements: user attitudes and behaviors.
Richard Shay
Saranga Komanduri
Patrick Gage Kelley
Pedro Giovanni Leon
Michelle L. Mazurek
Lujo Bauer
Nicolas Christin
Lorrie Faith Cranor
Coauthors
Adam Bates
(1)
Adam Doupé
(1)
Adam J. Aviv
(5)
Aditya Kishore
(1)
Alaa Daffalla
(1)
Alan F. Luo
(4)
Alexander Farmer
(1)
Alexandra McKay
(1)
Allison McDonald
(1)
Amelia R. Malone
(1)
Amit Elazari
(1)
Amritha Jayanti
(1)
Andrew Ruef
(1)
Andrew Yang
(1)
Angelisa C. Plane
(1)
Animesh Srivastava
(1)
Anna Chan
(2)
Aravind Koneru
(1)
Aron Laszka
(1)
Arthur Borem
(2)
Ashna Mediratta
(1)
Aurelie Roubinowitz
(1)
Ben Weinshel
(2)
Benoit Seguin
(1)
Blase Ur
(11)
Brook Stacy
(1)
Bruce Wen
(1)
Caroline Yang
(1)
Carson Powers
(1)
Catherine Barwulor
(1)
Charalampos Papamanthou
(1)
Chloé Messdaghi
(2)
Christian Stransky
(4)
Christopher Pellegrini
(1)
Ciara Lynton
(1)
Claire Dolin
(1)
Colin Ahern
(1)
Collins W. Munyendo
(2)
Damon McCoy
(1)
Dana Cuomo
(1)
Daniel Serrano
(1)
Daniel Votipka
(13)
Darya Kurilova
(1)
Darya Melicher
(1)
Dave Levin
(3)
Debjani Saha
(1)
Desiree Abrokwa
(2)
Devdatta Akhawe
(1)
Dhruv Kuchhal
(1)
Dominik Wermke
(2)
Doowon Kim
(4)
Dorota Filipczuk
(1)
Duc Cuong Nguyen
(1)
Elissa M. Redmiles
(12)
Elleen Pan
(1)
Emily Tseng
(1)
Emma Shroyer
(1)
Eric Zhang
(1)
Euirim Choi
(1)
Evan J. Zhao
(1)
Everest Liu
(1)
Faris Bugra Kokulu
(1)
Florian Kerschbaum
(4)
Florian Schaub
(1)
Garrett Bladow
(1)
Hamza Harkous
(1)
Ian Miers
(1)
James Chapman
(1)
James Parker
(3)
Jan Tolsdorf
(1)
Jason Walter
(1)
Jeffrey S. Foster
(2)
Jens Grossklags
(1)
Jeremy Hu
(1)
Jill Palzkill Woelfer
(1)
Joel Lee
(1)
John P. Dickerson
(1)
Joseph Lewis
(1)
Josiah Dykstra
(1)
Julio C. López
(1)
Julio Poveda
(1)
Junho Eum
(1)
Justin Goodman
(1)
Kaitlyn Yang
(1)
Kelsey R. Fulton
(7)
Kevin Bryson
(1)
Kevin Halliday
(1)
Kevin Song
(1)
Kiran Javkar
(1)
Krishna P. Gummadi
(1)
Kristopher K. Micinski
(2)
Kurt Thomas
(1)
Laura Edelson
(1)
Liana Wang
(1)
Lorrie Faith Cranor
(8)
Luca Dovichi
(1)
Lujo Bauer
(8)
Madison Stamos
(2)
Mahmood Sharif
(1)
Mainack Mondal
(1)
Manya Sleeper
(1)
Margot Herman
(2)
Marshini Chetty
(2)
Mary Nicole Dugay Punzalan
(1)
Matthew Hou
(1)
Micah Sherr
(5)
Michael Backes
(3)
Michael Carl Tschantz
(1)
Michael Freyberger
(1)
Michael Hicks
(3)
Michael Maass
(1)
Michael Pearson
(1)
Michael W. Hicks
(1)
Michelle L. Mazurek
(80)
Miraida Morales
(1)
Miranda Wei
(2)
Monica Kodwani
(1)
Moses Namara
(2)
Nathan Malkin
(7)
Nathan Reitinger
(5)
Nicholas Farber
(1)
Nickolas Gravel
(1)
Nicola Dell
(1)
Nicolas Christin
(8)
Nina Taft
(1)
Noel Warford
(7)
Nora McDonald
(1)
Olufunmilola Obielodan
(1)
Omer Akgul
(9)
Omprakash Gnawali
(1)
Paige Pepitone
(1)
Patrick Gage Kelley
(10)
Patrick Sweeney
(1)
Pedro Giovanni Leon
(1)
Peter Mayer
(1)
Phoebe Moh
(3)
Piotr Mardziel
(1)
Prateek Mittal
(1)
Pubali Datta
(1)
Rachel Greenstadt
(1)
Rebecca Gelles
(1)
Richard Roberts
(3)
Richard Shay
(8)
Rock Stevens
(5)
Rosanna Bellini
(1)
Sai Teja Peddinti
(1)
Samantha Katcher
(2)
Samuel Dooley
(1)
Saranga Komanduri
(8)
Sascha Fahl
(4)
Sean Kross
(4)
Sean M. Segreti
(2)
Seth M. Rabin
(3)
Shawn Shan
(1)
Shruti Das
(2)
Simson L. Garfinkel
(2)
Sophie Veys
(2)
Sunny Consolvo
(2)
Sushant Patkar
(1)
Taha Eghtesad
(1)
Tara Matthews
(2)
Thomas Gilray
(1)
Thomas Ristenpart
(1)
Timothy Passaro
(1)
Timothy Vidas
(5)
Tobias Lauinger
(1)
Tudor Dumitras
(1)
Warren He
(1)
Wei Bai
(4)
Wendy Knox Everette
(1)
Wentao Guo
(1)
Wentao Guo
(2)
William Melicher
(2)
Yasemin Acar
(4)
Yasmin Abdi
(1)
Yichen Qian
(1)
Yla R. Tausczik
(1)
Ziyun Zhu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to