A Research Framework and Initial Study of Browser Security for the Visually Impaired
Thu 27 October 2022
A Research Framework and Initial Study of Browser Security for the Visually Impaired
Continue reading »
A Research Framework and Initial Study of Browser Security for the Visually Impaired
Continue reading »
Cryptocurrency for everyone
Continue reading »
Teaching Privacy with Social Network
Continue reading »
Cybersecurity Fellow
Continue reading »
Evaluting ARGs in the Classroom
Continue reading »
A conversation on developing the cybersecuirty workforce
Continue reading »
Privacy for CS Undergrads
Continue reading »
Mixed Approaches to CS0
Continue reading »
Speaking at the UCL Academic Centre of Excellence in Cybersecurity Research lecture series
Continue reading »
Creating a video demonstrating the value of visualizing security issues through game play
Continue reading »
Cybersecurity Competitions
Continue reading »
Participating in the Engineeing Possibilities in College Summer Camp 2016
Continue reading »
Audio recording of my 2016 Data Studio Talk
Continue reading »
I've been selected to be US-UK Cybersecurity Fulbright Scholar!
Continue reading »
Talking about Talking about Cybersecurity Games
Continue reading »
Our project has a new website
Continue reading »
This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates
Continue reading »
Creating the USENIX Summit on games for security education
Continue reading »
Speaking at USENIX CSET 2015
Continue reading »
A Research Framework and Initial Study of Browser Security for the Visually Impaired
Continue reading »
Speaking at SOUPS/WIPS 2015
Continue reading »
DEFY: A Deniable, Encrypted File System for Log-Structured Storage
Continue reading »
I got a Google CS Engagement Award
Continue reading »
Valuing Security by Getting [d0x3d!]: Experiences with a network security board game
Continue reading »
Security through Play
Continue reading »
Geolocating Data in the Cloud
Continue reading »
Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices
Continue reading »
Remote Data Checking Using Provable Data Possession
Continue reading »
Security Constructs for Regulatory-Compliant Storage
Continue reading »
Provable Data Possession at Untrusted Stores
Continue reading »
Design and Implementation of Verifiable Audit Trails for a Versioning File System
Continue reading »
Secure Deletion for a Versioning File System
Continue reading »
Ext3cow: A Time-Shifting File System for Regulatory Compliance
Continue reading »