Author of the publication

Game-Based Information Security/Privacy Education and Awareness: Theory and Practice.

, , , and . EMCIS, volume 402 of Lecture Notes in Business Information Processing, page 509-525. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Receipt-Freeness in Large-Scale Elections without Untappable Channels., , and . I3E, volume 202 of IFIP Conference Proceedings, page 683-693. Kluwer, (2001)Strong Forward Security., , , and . SEC, volume 193 of IFIP Conference Proceedings, page 109-122. Kluwer, (2001)Lightweight private proximity testing for geospatial social networks., , , and . Comput. Commun., (2016)A Model for Hybrid Evidence Investigation., , and . WDFIA, page 119-128. Plymouth University, UK, (2012)Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems., and . WEBIST (1), page 301-304. INSTICC Press, (2008)Uncoercible e-Bidding Games., , and . Electron. Commer. Res., 4 (1-2): 113-125 (2004)An Equitably Fair On-line Auction Scheme., , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 72-83. Springer, (2000)Game-Based Information Security/Privacy Education and Awareness: Theory and Practice., , , and . EMCIS, volume 402 of Lecture Notes in Business Information Processing, page 509-525. Springer, (2020)A Novel Stochastic Approach for Modeling Random Scanning Worms., , , and . Panhellenic Conference on Informatics, page 176-179. IEEE Computer Society, (2009)AI-Powered Penetration Testing using Shennina: From Simulation to Validation., , , , , , and . ARES, page 169:1-169:7. ACM, (2024)