Cybersecurity Regrets: I’ve had a few…. Je Ne Regrette (DOI)
Karen Renaud, Marc Dupuis, Rosalind Searle
“It may be a pain in the backside but…”: Insights into the resilience of business after GDPR(DOI)
Gerard Buckley, Tristan Caulfield, and Ingolf Becker
Side Auth: Synthesizing Virtual Sensors for Authentication (DOI)
Yan Long, Kevin Fu
Designing Through The Stack: The Case for a Participatory Digital Security By Design (DOI)
Ian Slesinger, Lizzie Coles-Kemp, Niki Panteli and Rene Rydhof Hansen
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs (DOI)
Partha Das Chowdhury, Andres Dominguez, Kopo M. Ramokapane and Awais Rashid
Passwords and Cryptwords: The Final Limits on Lengths (DOI)
Michael Clark and Kent Seamons
Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces (DOI)
Michael Clifford, Karl Levitt, Matt Bishop, Miriam Heller
Incidental Incremental In-Band Fingerprint Verification: a Novel Authentication Ceremony for End-to-End Encrypted Messaging (DOI)
Nathan Malkin
Toward User Control over Information Access: A Sociotechnical Approach (DOI)
Caleb Malchik and Joan Feigenbaum
Transparency, Compliance, And Contestability When Code Is(n't) Law (DOI)
Alexander Hicks