A Research Framework and Initial Study of Browser Security for the Visually Impaired

A Research Framework and Initial Study of Browser Security for the Visually Impaired

Continue reading »

On Stablecoins: Stability Mechanisms and Use Cases for Real People. In: Proceedings of the Third International Symposium on Foundations and Applications of Blockchain, 2020

Cryptocurrency for everyone

Continue reading »

Fakesbook: A social networking platform for teaching security and privacy concepts to secondary school students. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2019

Teaching Privacy with Social Network

Continue reading »

Authenticity, Ethicality, and Motivation: A Formal Evaluation of a 10-week Computer Security Alternate Reality Game for CS Undergraduates. In: Proceedings of the USENIX Advances in Security Education Workshop (ASE), 2018.

Evaluting ARGs in the Classroom

Continue reading »

Introducing Privacy to Undergraduate Computing Students. In: Proceedings of the Consortium for Computing in the Colleges Southwest Region Conference, 2018

Privacy for CS Undergrads

Continue reading »

Mixed approaches to CS0: Exploring topic and pedagogy variance after six years of CS0. In: Proceedings of the ACM Technical Symposium on Computing Science Education (SIGCSE), 2018.

Mixed Approaches to CS0

Continue reading »

The Outcomes of Cybersecurity Competitions and Implications for Underrepresented Populations. IEEE Security & Privacy, 14(6), pp. 90-95, November-December 2016

Cybersecurity Competitions

Continue reading »

Talking about Talking about Cybersecurity Games. USENIX ;login:, 41(1), pp. 36-39, Spring 2016

Talking about Talking about Cybersecurity Games

Continue reading »

This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates. In: Proceedings of the Workshop on Cyber Security Experimentation and Test. 2015.

This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates

Continue reading »

A Research Framework and Initial Study of Browser Security for the Visually Impaired. In: Proceedings of the Workshop on Inclusive Privacy and Security. 2015.

A Research Framework and Initial Study of Browser Security for the Visually Impaired

Continue reading »

DEFY: A Deniable, Encrypted File System for Log-Structured Storage. In: Proceedings of the Network and Distributed System Security Symposium. 2015.

DEFY: A Deniable, Encrypted File System for Log-Structured Storage

Continue reading »

Valuing Security by Getting [d0x3d!]: Experiences with a network security board game. In: Proceedings of the Workshop on Cyber Security Experimentation and Test (CSET), 2013.

Valuing Security by Getting [d0x3d!]: Experiences with a network security board game

Continue reading »

Security through Play. IEEE Security & Privacy, 11(3), pp. 64-67, May-June 2013

Security through Play

Continue reading »

Geolocating Data in the Cloud. In: Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY), 2013.

Geolocating Data in the Cloud

Continue reading »

Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices. In: Proceedings of the ACM CCS Workshop on Security and Privacy in Mobile Devices, 2011.

Securing Electronic Medical Records Using Attribute-Based Encryption On Mobile Devices

Continue reading »

Remote Data Checking Using Provable Data Possession. ACM Transactions on Information and System Security, 14(1) May 2011.

Remote Data Checking Using Provable Data Possession

Continue reading »

Security Constructs for Regulatory-Compliant Storage. Communications of the ACM. 53(1), January 2010.

Security Constructs for Regulatory-Compliant Storage

Continue reading »

Provable Data Possession at Untrusted Stores. In: Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2007.

Provable Data Possession at Untrusted Stores

Continue reading »

Design and Implementation of Verifiable Audit Trails for a Versioning File System. In: Proceedings of the USENIX Conference on File and Storage Technologies (FAST), 2007.

Design and Implementation of Verifiable Audit Trails for a Versioning File System

Continue reading »

Ext3cow: A Time-Shifting File System for Regulatory Compliance. ACM Transactions on Storage. 1(2), May 2005.

Ext3cow: A Time-Shifting File System for Regulatory Compliance

Continue reading »