Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Arash Atashpendar |
Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark |
Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas |
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson (eds.) |
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm (eds.) |
Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Filip Jurnecka, Martin Stehlík, Vashek Matyás |
On Node Capturing Attacker Strategies. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas |
Better Authentication Password Revolution by Evolution (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan |
Remark!: A Secure Protocol for Remote Exams. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Henry Tan, Micah Sherr |
Censorship Resistance as a Side-Effect (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore 0002, L. Jean Camp, Kevin Benton, Ross J. Anderson |
Collaborating with the Enemy on Network Management. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Vit Bukac, Vaclav Lorenc, Vashek Matyás |
Red Queen's Race: APT Win-Win Game. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Dieter Gollmann |
Why Bother Securing DNS? |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Dieter Gollmann |
Why Bother Securing DNS? (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Shishir Nagaraja |
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Dancing with the Adversary: A Tale of Wimps and Giants. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Henry Tan, Micah Sherr |
Censorship Resistance as a Side-Effect. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano |
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rosario Giustolisi |
Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley |
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Gardiner, Shishir Nagaraja |
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Jérémie Koenig |
On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Max Spencer |
Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Vit Bukac |
Red Queen's Race: APT Win-Win Game (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury, Bruce Christianson |
Beyond Trust. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Olgierd Pieczul, Simon N. Foley |
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas, Alastair R. Beresford |
Better Authentication: Password Revolution by Evolution. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury |
Beyond Trust (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau, Andrew Miller 0001 |
Fawkescoin - A Cryptocurrency Without Public-Key Cryptography. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yvo Desmedt |
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Aaron D. Jaggard, Rebecca N. Wright |
Strange Bedfellows: How and When to Work with Your Enemy. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Jérémie Koenig |
On the Feasibility of a Technological Response to the Surveillance Morass. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rebecca N. Wright |
Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Filip Jurnecka |
On Node Capturing Attacker Strategies (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yvo Desmedt |
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Chris Hall |
Collaborating with the Enemy on Network Management (Transcript of Discussion). |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington |
Bootstrapping Adoption of the Pico Password Replacement System. |
Security Protocols Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.) |
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau (eds.) |
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: What's Happening on the Other Channel? (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Rushil Khurana, Shishir Nagaraja |
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Jun Zhao 0007, Virgil D. Gligor, Adrian Perrig, James Newsome |
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie |
Towards a Theory of Application Compartmentalisation. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Shishir Nagaraja |
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Alec Yasinsac |
Independent Computations for Safe Remote Electronic Voting. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Bergadano |
Communication Setup in Anonymous Messaging (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Dongting Yu |
Authentication for Resilience: The Case of SDN (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford |
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Rubin Xu |
Towards a Stronger Location Integrity (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ariel Stulman |
Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Dongting Yu, Andrew W. Moore 0002, Chris Hall, Ross J. Anderson |
Authentication for Resilience: The Case of SDN. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bin B. Zhu, Jeff Yan |
Towards New Security Primitives Based on Hard AI Problems. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Bergadano |
Communication Setup in Anonymous Messaging. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda, Václav Matyás |
On the Origin of Yet another Channel. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Mohammed H. Almeshekah |
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda |
On the Origin of Yet another Channel (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert N. M. Watson |
Towards a Theory of Application Compartmentalisation (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague |
Verifiable Postal Voting. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001 |
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Vanessa Teague |
End-to-End Verifiable Postal Voting (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001, Dylan Clarke, Carlton Shepherd |
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Alec Yasinsac |
Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ariel Stulman, Jonathan Lahav, Avraham Shmueli |
Spraying Diffie-Hellman for Secure Key Exchange in MANETs. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Rubin Xu, Dongting Yu |
Towards a Stronger Location Integrity. |
Security Protocols Workshop |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson (eds.) |
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Todd R. Andel, Alec Yasinsac |
Secure Internet Voting Protocol for Overseas Military Voters. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig |
Street-Level Trust Semantics for Attribute Authentication. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Todd R. Andel |
Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001, Brian Randell, Dylan Clarke |
Self-enforcing Electronic Voting. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Dylan Clarke |
Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Statistical Metrics for Individual Password Strength (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro |
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001 |
Self-enforcing Electronic Voting (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Mauro Conti |
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Statistical Metrics for Individual Password Strength. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Robert N. M. Watson |
Stayin' Alive: Aliveness as an Alternative to Authentication. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson |
Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Shah Mahmood, Yvo Desmedt |
Usable Privacy by Visual and Interactive Control of Information Flow. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Dylan Clarke, Feng Hao 0001, Brian Randell |
Analysis of Issues and Challenges of E-Voting in the UK. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Protocol Governance: The Elite, or the Mob? |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Shah Mahmood |
Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Yuko Murayama |
Usability Issues in Security (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Oliver Stannard, Frank Stajano |
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Yuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka |
Usability Issues in Security. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Phillip J. Brooke |
Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion). |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Phillip J. Brooke, Richard F. Paige, Christopher Power |
Approaches to Modelling Security Scenarios with Domain-Specific Languages. |
Security Protocols Workshop |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano (eds.) |
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.) |
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mark Dermot Ryan, Ben Smyth |
Applied pi calculus. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Anupam Datta, John C. Mitchell, Arnab Roy 0001, Stephan Hyeonjun Stiller |
Protocol Composition Logic. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
Computational Soundness - The Case of Diffie-Hellman Keys. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Steve A. Schneider |
Security Analysis using Rank Functions in CSP. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Véronique Cortier, Steve Kremer |
Introduction. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|