Author of the publication

SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education.

, , , , , , , , , and . 3GSE, USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity: Exploring core concepts through six scenarios., , , , , , , and . Cryptologia, 42 (4): 337-377 (2018)Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)., , and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 212-226. Springer, (1985)Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)., , , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 294-301. Springer, (2011)Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting., , , , , , and . IEEE Secur. Priv., 6 (3): 40-46 (2008)*Socrates 2.0 Beats Grandmaster Sagalchik., and . J. Int. Comput. Games Assoc., 18 (2): 124 (1995)A Note on Bennett's Time-Space Tradeoff for Reversible Computation., and . SIAM J. Comput., 19 (4): 673-677 (1990)Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English., and . Cryptologia, 18 (4): 289-331 (1994)How we Solved the $100, 000 Decipher Puzzle (16 Hours too late)., and . Cryptologia, 14 (3): 258-284 (1990)BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer., and . IACR Cryptol. ePrint Arch., (2020)UDM: Private user discovery with minimal information disclosure., , , and . Cryptologia, 46 (4): 347-379 (2022)