Search

Your search keyword '"Staddon, Jessica"' showing total 95 results

Search Constraints

Start Over You searched for: Author "Staddon, Jessica" Remove constraint Author: "Staddon, Jessica"
95 results on '"Staddon, Jessica"'

Search Results

1. Assessment of LLM Responses to End-user Security Questions

2. Can LLMs be Scammed? A Baseline Measurement Study

3. Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints

4. Policy by Example: An Approach for Security Policy Specification

6. Secure Conjunctive Keyword Search over Encrypted Data

15. Security Policy Audits: Why and How

16. Multirecipient encryption schemes: how to save on bandwidth and computation without sacrificing security

17. Applications of list decoding to tracing traitors

18. Beyond Passwords—Challenges and Opportunities of Future Authentication.

23. Equity and Privacy: More Than Just a Tradeoff.

30. Combinatorial Properties of Frameproof and Traceability Codes

37. Protecting the Privacy of Individuals in Terrorist Tracking Applications

41. Controlling data in the cloud

Catalog

Books, media, physical & digital resources