Financial Cryptography and Data Security FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selec...
        Saved in:
      
    
          | Main Authors | , , , , , , | 
|---|---|
| Format | eBook | 
| Language | English | 
| Published | 
        Cham
          Springer Nature
    
        2020
     Springer International Publishing AG Springer  | 
| Edition | 1 | 
| Series | LNCS sublibrary, SL 4, Security and cryptology | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 3030544559 9783030544553 3030544540 9783030544546  | 
Cover
                Table of Contents: 
            
                  - 2.1 Brief Overview of the Internet Domain Name System
 - Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions and Method Preferences -- 1 Introduction -- 2 Aim -- 2.1 Privacy vs Sharing Empowerment -- 2.2 Privacy and Sharing Methods, Similarties and Differences -- 3 Method -- 3.1 Participants -- 3.2 Procedure -- 3.3 Measurement Apparatus -- 4 Results -- 4.1 Empowerment Perception -- 4.2 Privacy and Sharing Methods -- 5 Discussion -- 5.1 Methods Preference and Behavior -- 6 Conclusion -- 7 Appendix -- References -- Security and Privacy Awareness in Smart Environments - A Cross-Country Investigation -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Smart Environments -- 3.2 Country Selection -- 3.3 Study Procedure -- 3.4 Recruitment and Participants -- 3.5 Data Analysis -- 4 Results -- 4.1 Total Responses -- 4.2 Security and Privacy Issues -- 4.3 Statistical Analysis -- 5 Discussion -- A Supplementary Materials -- A.1 Code Book -- A.2 Description of Smart Environments as Stated in the Questionnaire -- A.3 Questionnaire -- A.4 Demographics of the Sample -- A.5 Output of the Statistical Analysis -- References -- Understanding Perceptions of Smart Devices -- 1 Introduction -- 2 Related Work -- 2.1 Privacy and Security of Smart Devices -- 2.2 Data Value and Sensitivity -- 2.3 Relationship to Research Objectives -- 3 Method -- 4 Findings -- 4.1 Perceptions Regarding Data -- 4.2 Perceptions Regarding Privacy -- 5 Discussion -- 6 Limitations -- 7 Conclusion -- References -- In Our Employer We Trust: Mental Models of Office Workers' Privacy Perceptions -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Findings -- 4.1 Self-disclosure and Consent -- 4.2 Data Processors -- 4.3 Purposes of Data Processing -- 4.4 Invasion of Privacy -- 5 Discussion -- 5.1 Implications for Transparency and Control -- 6 Conclusion -- Appendix A Participants
 - Appendix B Interview Outline (Translated) -- References -- Behaviour of Outsourced Employees as Sources of Information System Security Threats -- 1 Background -- 2 Research Objective -- 3 Literature Review -- 4 Theoretical Framework -- 4.1 Conceptual Model -- 4.2 Hypotheses -- 5 Research Methodology -- 5.1 Data Collection -- 5.2 Demography -- 5.3 Analysis -- 6 Testing the Model -- 7 Contribution and Implication -- 8 Conclusion -- 9 Declaration of Replication Studies -- References -- Exploring Effects of Auditory Stimuli on CAPTCHA Performance -- 1 Introduction -- 2 Methodology -- 2.1 CAPTCHA Generation -- 2.2 Stimuli Selection -- 2.3 Psychophysical Description of Stimuli -- 2.4 Initial Hypotheses -- 2.5 Recruitment -- 3 Results -- 4 Discussion of Observed Effects -- 5 Unattended Setup Analysis -- 6 Conclusions and Future Work -- A A: Background and Related Work -- A.1 Automated Experiments -- A.2 User Studies of Text-Based CAPTCHAs -- A.3 Effects of Sensory Stimulation -- B B: Study Shortcomings -- C C: Ethical Consideration -- References -- PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records -- 1 Introduction -- 2 Related Work -- 3 Design of PassPage -- 3.1 Sign-up Module -- 3.2 Browsing History Recording Module -- 3.3 Decoy Web Pages Maintenance Module -- 3.4 Login Module -- 4 User Experiments -- 4.1 Experiment Procedure -- 4.2 Experiment Results -- 5 Widespread Use of PassPage -- 5.1 PassPage on Multiple Websites -- 5.2 PassPass on Multiple Platforms -- 6 Security and Privacy -- 7 Conclusion and Future Work -- References -- Empathy as a Response to Frustration in Password Choice -- 1 Introduction -- 2 Background -- 2.1 User Password -- 2.2 Empathy -- 2.3 Frustration Regulation -- 3 Aim -- 3.1 Impact of Empathy on Password Choice -- 3.2 Impact of Password Characteristics on Emotions -- 4 Methodology
 - 4.1 Sample Participants -- 4.2 Procedure -- 4.3 Scenario -- 4.4 Manipulation -- 4.5 Measurements -- 4.6 Ethics -- 5 Results -- 5.1 Manipulation Check -- 5.2 Password Strength Between Conditions -- 5.3 Impact of Password Characteristics on Emotions -- 6 Discussion -- 7 Conclusion -- 8 Appendix -- 8.1 Password Characteristics -- 8.2 Password ReUse Strategy -- 8.3 Empathy Quotient -- 8.4 Impact of Password Characteristics on Emotions -- References -- Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Tools -- 4 Study -- 5 Conclusion and Future Work -- References -- Incorporating Psychology into Cyber Security Education: A Pedagogical Approach -- 1 Introduction -- 2 Identifying Relevant Areas of Psychology -- 2.1 The Adversaries -- 2.2 The Targets -- 3 Pedagogical Approaches -- 3.1 Understanding Student Motivations and Expectations -- 3.2 Perspective Shifting -- 4 Teaching Psychology in the Workplace -- 5 Conclusions -- References -- I CoDeFi: First Workshop on Coordination of Decentralized Finance -- Effectiveness of Multi-stakeholder Discussions for Decentralized Finance: A Conference Report of CoDeFi 2020 -- 1 Introduction -- 1.1 Background -- 1.2 A Series of Workshop -- 2 Issues of Blockchain Ecosystem Toward Social Foudation -- 2.1 Three Aspects Toward Healthy Ecosytem -- 2.2 Pain Points of Stakeholders -- 2.3 How Multi-stakeholder Discussions Help to Create a Better Order of Decentralized Finance -- 3 Goals and Structure of the Workshop -- 4 Main Discussions at Unconference Sessions -- 4.1 Facilitating Multi-stakeholder Discussion -- 4.2 Privacy and Traceability -- 5 Conclusion and Future Activity -- References -- Multistakeholder Governance for the Internet -- 1 Introduction -- 2 The Internet Multistakeholderism
 - Intro -- AsiaUSEC 2020 Preface -- AsiaUSEC 2020 Organization -- CoDeFi 2020 Preface -- CoDeFi 2020 Organization -- VOTING 2020 Preface -- VOTING 2020 OrganizationProgram ChairsPeter B. RønneUniversity of Luxembourg, LuxembourgMatthew BernhardUniversity of Michigan, USAProgram CommitteeRoberto AraujoUniversidade Federal do Pará, BrazilJosh BenalohMicrosoft Research, USAVéronique CortierCNRS, Loria, FranceChris CulnaneThe University of Melbourne, AustraliaJeremy EpsteinSRI, USAAleksander EssexWestern University, CanadaJosh FranklinOutStack Technologies, USAKristian GjøsteenNorwegian University of Science and Technology, NorwayRajeev -- Program ChairsPeter B. RønneUniversity of Luxembourg, LuxembourgMatthew BernhardUniversity of Michigan, USAProgram CommitteeRoberto AraujoUniversidade Federal do Pará, BrazilJosh BenalohMicrosoft Research, USAVéronique CortierCNRS, Loria, FranceChris CulnaneThe University of Melbourne, AustraliaJeremy EpsteinSRI, USAAleksander EssexWestern University, CanadaJosh FranklinOutStack Technologies, USAKristian GjøsteenNorwegian University of Science and Technology, NorwayRajeev GoreThe Australian Nati -- WTSC 2020 Preface -- WTSC 2020 Organization -- Contents -- I AsiaUSEC: First Asian Workshop on Usable Security -- Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea -- 1 Introduction -- 2 Background and Related Work -- 3 Survey Methodology -- 4 User Study Results -- 4.1 Analysis of Browser Usage -- 4.2 Analysis of Multiple Browsers Usage -- 4.3 Browser Usage for Different Services -- 4.4 Usability of Korean National Digital Certificates -- 4.5 Common Reasons for Using Digital Certificates -- 4.6 Knowledge on the Abolishment of the Mandatory Use of National Digital Certificates -- 5 Discussion and Limitations -- 6 Conclusion -- A Appendix -- A.1 Survey Questions -- A.2 Demographics information
 - A.3 User Responses -- References -- User-Centered Risk Communication for Safer Browsing -- 1 Introduction -- 2 Related Work -- 2.1 Security as Risk Communication -- 2.2 Browser Warnings and Toolbars -- 2.3 Graphical Usage in Risk Communication -- 2.4 Usability and Adaptability -- 3 Prototype Design -- 4 Method: Naturalistic Study -- 5 Results: Naturalistic Study -- 5.1 Understanding the Tool -- 5.2 Changing Tool Risk Levels -- 5.3 Warnings -- 6 Method: In-Lab Experiment -- 7 Results: In-Lab Experiment -- 8 Discussion -- 9 Limitations and Future Work -- 10 Conclusion -- References -- Secure Email - A Usability Study -- 1 Introduction -- 2 Methodology -- 2.1 Online Survey -- 2.2 User Testing -- 3 Evaluation -- 3.1 Online Survey Results -- 3.2 User Testing Results -- 4 Related Work -- 5 Conclusion -- References -- The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails -- 1 Introduction -- 1.1 The Phishing Problem -- 1.2 Study Aims -- 1.3 Hypotheses -- 2 Method -- 2.1 Participants -- 2.2 Materials -- 2.3 Apparatus -- 2.4 Procedure -- 3 Results -- 3.1 Data Reduction -- 3.2 Cue Utilization, Cognitive Load, and Phishing Detection -- 4 Discussion -- 4.1 Cognitive Load -- 4.2 Cue Utilization -- 4.3 Cue Utilization, Cognitive Load, and Phishing Detection -- 4.4 Limitations -- 4.5 Conclusion -- References -- Cue Utilization, Phishing Feature and Phishing Email Detection -- 1 Introduction -- 1.1 Study Aims -- 1.2 Phishing Features and Cognitive Processing -- 1.3 Cue Utilization -- 2 Method -- 2.1 Participants -- 2.2 Materials -- 2.3 Procedure -- 3 Results -- 3.1 Cue Utilization Typologies -- 3.2 Performance on the Phishing Feature Task -- 3.3 Performance on the Phishing Detection Task -- 4 Discussion -- 4.1 Limitations and Future Research -- 5 Conclusion -- Appendix -- References