Forgive and forget: return to obscurity (DOI)
Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan
Towards the realization of a public health system for shared secure cyber-space (DOI)
Jeff Rowe, Karl Levitt, Mike Hogarth
Detecting hidden enemy lines in IP address space (DOI)
Suhas Mathur, Baris Coskun, Suhrid Balakrishnan
Useful password hashing: how to waste computing cycles with style (DOI)
Markus Dürmuth
Markets for zero-day exploits: ethics and implications (DOI)
Serge Egelman, Cormac Herley, Paul C. van Oorschot
Principles of authentication (DOI)
Sean Peisert, Ed Talbot, Tom Kroeger
Towards narrative authentication: or, against boring authentication (DOI)
Anil Somayaji, David Mould, Carson Brown
Go with the flow: toward workflow-oriented security assessment (DOI)
Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K.Y. Yau
Explicit authentication response considered harmful (DOI)
Lianying Zhao, Mohammad Mannan
Can we sell security like soap?: a new approach to behaviour change (DOI)
Debi Ashenden, Darren Lawrence
Booby trapping software (DOI)
Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz
Information behaving badly (DOI)
Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun
Designing forensic analysis techniques through anthropology (DOI)
Sathya Chandran Sundaramurthy
NSPHD: the polyglot computer (DOI)
Daniel Medeiros Nunes de Castro