What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Karen Renaud
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/soups
Unpacking the Social and Emotional Dimensions of Security and Privacy User Engagement.
Nina Gerber
Verena Zimmermann
Alexandra von Preuschen
Karen Renaud
2024
journals/compsec
Privacy policy analysis: A scoping review and research agenda.
Karl van der Schyff
Suzanne Prior
Karen Renaud
2024
conf/nspw
"When Data Breaches Happen, Where Does the Buck Stop?... and where should it stop?".
Partha Das Chowdhury
Karen Renaud
Awais Rashid
2023
journals/compsec
Cybersecurity Insights Gleaned from World Religions.
Karen Renaud
Marc J. Dupuis
2023
journals/compsec
Would US citizens accept cybersecurity deresponsibilization? Perhaps not.
Karen Renaud
Karl van der Schyff
Stuart MacDonald
2023
conf/nspw
'Ought' should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach.
Partha Das Chowdhury
Karen Renaud
2022
conf/nspw
Cybersecurity Regrets: I've had a few.... Je Ne Regrette.
Karen Renaud
Rosalind Searle
Marc J. Dupuis
2021
conf/nspw
Shame in Cyber Security: Effective Behavior Modification Tool or Counterproductive Foil?
Karen Renaud
Rosalind Searle
Marc J. Dupuis
2020
journals/compsec
Risk as affect: The affect heuristic in cybersecurity.
Paul van Schaik
Karen Renaud
Christopher J. Wilson
Jurjen Jansen
Joseph A. Onibokun
2020
journals/compsec
The privacy paradox applies to IoT devices too: A Saudi Arabian study.
Noura Aleisa
Karen Renaud
Ivano Bongiovanni
2020
conf/fc
Towards Improving the Efficacy of Code-Based Verification in Internet Voting.
Oksana Kulyk
Melanie Volkamer
Monika Müller
Karen Renaud
2019
journals/compsec
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords?
Karen Renaud
Robert F. Otondo
Merrill Warkentin
2019
conf/nspw
Cyber security fear appeals: unexpectedly complicated.
Karen Renaud
Marc J. Dupuis
2018
journals/compsec
Is the responsibilization of the cyber security risk reasonable and judicious?
Karen Renaud
Stephen Flowerday
Merrill Warkentin
Paul Cockshott
Craig P. Orgeron
2018
journals/istr
Introduction to special issue on e-voting.
Jurlind Budurushi
Stephan Neumann
Karen Renaud
Melanie Volkamer
2018
conf/soups
Replication Study: A Cross-Country Field Observation Study of Real World PIN Usage at ATMs and in Various Electronic Payment Scenarios.
Melanie Volkamer
Andreas Gutmann
Karen Renaud
Paul Gerber
Peter Mayer
2017
journals/compsec
User experiences of TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Melanie Volkamer
Karen Renaud
Benjamin Reinheimer
Alexandra Kunz
2017
journals/istr
Contemplating human-centred security & privacy research: Suggesting future directions.
Karen Renaud
Stephen Flowerday
2017
journals/istr
The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions.
Paul Gerber
Melanie Volkamer
Karen Renaud
2017
journals/istr
Human-centred cyber security.
Karen Renaud
Stephen Flowerday
2017
conf/nspw
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact.
Karen Renaud
Merrill Warkentin
2016
conf/sec
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn.
Melanie Volkamer
Karen Renaud
Benjamin Reinheimer
2016
conf/eurosp
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Andreas Gutmann
Karen Renaud
Joseph Maguire
Peter Mayer
Melanie Volkamer
Kanta Matsuura
Jörn Müller-Quade
2013
journals/compsec
A framework for continuous, transparent mobile device authentication.
Heather Crawford
Karen Renaud
Tim Storer
2009
conf/nspw
Musipass: authenticating me softly with "my" song.
Marcia Gibson
Karen Renaud
Marc Conrad
Carsten Maple
Coauthors
Alexandra Kunz
(1)
Alexandra von Preuschen
(1)
Andreas Gutmann
(2)
Awais Rashid
(1)
Benjamin Reinheimer
(2)
Carsten Maple
(1)
Christopher J. Wilson
(1)
Craig P. Orgeron
(1)
Heather Crawford
(1)
Ivano Bongiovanni
(1)
Jörn Müller-Quade
(1)
Joseph A. Onibokun
(1)
Joseph Maguire
(1)
Jurjen Jansen
(1)
Jurlind Budurushi
(1)
Kanta Matsuura
(1)
Karen Renaud
(25)
Karl van der Schyff
(2)
Marc Conrad
(1)
Marc J. Dupuis
(4)
Marcia Gibson
(1)
Melanie Volkamer
(7)
Merrill Warkentin
(3)
Monika Müller
(1)
Nina Gerber
(1)
Noura Aleisa
(1)
Oksana Kulyk
(1)
Partha Das Chowdhury
(2)
Paul Cockshott
(1)
Paul Gerber
(2)
Paul van Schaik
(1)
Peter Mayer
(2)
Robert F. Otondo
(1)
Rosalind Searle
(2)
Stephan Neumann
(1)
Stephen Flowerday
(3)
Stuart MacDonald
(1)
Suzanne Prior
(1)
Tim Storer
(1)
Verena Zimmermann
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to