Joseph Bonneau [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware SOUPS2019-2019 - Santa Clara, United States
Verifiable Delay Functions Crypto2018-2018 - Santa Barbara, USA
Differentially Private Password Frequency Lists NDSS-2016 - california,usa
Provisions: Proofs of solvency for cryptocurrencies RWC-2016 - stanford,usa
CONIKS: Bringing Key Transparency to End Users SecuritySymposium-2015 - washington,USA
Welcome and Discussion Format HotSec-2015 - washington,USA
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning NDSS-2015 - san diego,usa
Innovation in end-to-end encrypted communication tools RWC-2015 - London,UK
Towards Reliable Storage of 56-bit Secrets in Human Memory usenix-2014 - san diego,usa
Bitcoin: Pitfalls and Lessons Learned from the Rise, Fall and Resurrection of a Crypto-Currency Hotsec-2014 - san diego,usa
On Decentralizing Prediction Markets and Order Books WEIS-2014 - Pennsylvania,USA
The Tangled Web of Password Reuse NDSS-2014 - San Diego,USA
Short paper: S-links: Why distributed security policy requires secure introduction W2SP-2013 - San Francisco,USA Security
A birthday present every eleven wallets? The security of customer-chosen banking PINs Financial Cryptography and Data Security-2013 - Bonaire,Netherlands