Talks (Room F121 Lilybank Gardens)

30 September Everyone Launching 2014/15
7 October Karen Renaud Whence Human-Centred Security Research?
14 OctoberRose EnglishAndroid Permissions
21 OctoberSoum ChowdhuryGraphical Authentication
21 OctoberHani AljahdaliGraphical Authentication
3 NovemberMike JustReducing the password burden: Investigating the effectiveness of data-driven authentication on mobile

Security Conferences

Network and Distributed System Security (NDSS) Symposium.
IEEE Symposium on Security and Privacy (S&P)
Annual Computer Security Applications Conference (ACSAC)
Conference on Computer and Communications Security (CCS)
European Symposium on Research in Computer Security (ESORICS)
International Conference on Security and Privacy in Communication Networks (SecureComm)
ACM Symposium on Information, Computer and Communications Security
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Symposium on Access Control Models and Technologies (SACMAT)
Symposium On Usable Privacy and Security (SOUPS)
Privacy Enhancing Technologies Symposium (PETS)
IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN)
International Conference on Security of Information and Networks (SIN)
Privacy, Security, Risk and Trust (PASSAT)
European Workshop on System Security (EUROSEC)
IFIP Trust Management conference (IFIP TM)
International Conference on Trust, Privacy, and Security in Digital Business (TrustBUS)
Principles of Security and Trust (PST)
International Conference on Risks and Security of Internet and Systems (CRiSIS)
International Conference on Security and Cryptography (SECRYPT)
Information Security Conference (ISC)
International Conference on Privacy, Security and Trust (PST)
Digital Identity Management Workshop (DIM)
European Workshop on Public Key Infrastructures, Services and Applications (EuroPKI)
Security & Trust management (STM)