-
1
Vault: Fast Bootstrapping for the Algorand Cryptocurrency
Published 2021“…Internet Society…”
Get full text
Article -
2
Preventing lunchtime attacks: fighting insider threats with eye movement biometrics
Published 2015“…Internet Society…”
Conference item -
3
-
4
Practical attacks against privacy and availability in 4G/LTE mobile communication systems
Published 2017“…Internet Society…”
Conference item -
5
Usability and Security by Design: A Case Study in Research and Development
Published 2015“…Internet Society…”
Conference item -
6
Nearby threats: Reversing, analyzing, and attacking Google’s ‘nearby connections’ on android
Published 2019“…Internet Society…”
Conference item -
7
A view from the cockpit: exploring pilot reactions to attacks on avionic systems
Published 2020“…Internet Society…”
Conference item -
8
Component-based formal analysis of 5G-AKA: channel assumptions and session confusion
Published 2019“…Internet Society…”
Conference item -
9
Sonification in security operations centres: what do security practitioners think?
Published 2018“…Internet Society…”
Conference item -
10
CableAuth: a biometric second factor authentication scheme for electric vehicle charging
Published 2023“…Internet Society…”
Conference item -
11
Usability and security by design: a case study in research and development
Published 2015“…Internet Society…”
Journal article -
12
Sticky fingers: resilience of satellite fingerprinting against jamming attacks
Published 2024“…Internet Society…”
Conference item -
13
Cybercrime investigators are users too! Understanding the socio-technical challenges faced by law enforcement
Published 2019“…Internet Society…”
Conference item -
14
Firefly: spoofing Earth observation satellite data through radio overshadowing
Published 2023“…Internet Society…”
Conference item -
15
Iris: dynamic privacy preserving search in authenticated chord peer-to-peer networks
Published 2025“…Internet Society…”
Conference item -
16
Death by a thousand COTS: disrupting satellite communications using low earth orbit constellations
Published 2023“…Internet Society…”
Conference item -
17
BROKENWIRE: wireless disruption of CCS electric vehicle charging
Published 2023“…Internet Society…”
Conference item -
18
Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones
Published 2017“…Internet Society…”
Conference item -
19
-
20
QPEP: An actionable approach to secure and performant broadband from geostationary orbit
Published 2021“…Internet Society…”
Conference item