Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Joshua D. Guttman |
Shapes: Surveying Crypto Protocol Runs. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen |
Constraint solving techniques and enriching the model with equational theories. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Michaël Rusinowitch, Mathieu Turuani |
Verifying a bounded number of sessions and its complexity. |
Formal Models and Techniques for Analyzing Security Protocols |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bangdao Chen, Long Hoang Nguyen 0001, Andrew William Roscoe |
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alf Zugenmaier |
Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Can We Fix the Security Economics of Federated Authentication? |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
The Metaplace Security Model. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: Alice Doesn't Live Here Anymore (Transcript). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
The Metaplace Security Model (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau, Rubin Xu |
Scrambling for Lightweight Censorship Resistance. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sjouke Mauw |
Selective Location Blinding Using Hash Chains (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Gabriele Lenzini, Sjouke Mauw, Jun Pang 0001 |
Selective Location Blinding Using Hash Chains. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Omar Choudary 0001 |
Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Getting Web Authentication Right (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alex Shafarenko |
Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Rubin Xu |
Scrambling for Lightweight Censorship Resistance (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alexander V. Shafarenko, Bruce Christianson |
Gearing Up: How to Eat Your Cryptocake and Still Have It. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alf Zugenmaier |
Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001, Peter Y. A. Ryan |
How to Sync with Alice. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Jeannette M. Wing |
Towards a Theory of Trust in Networks of Humans and Computers. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | James Malcolm |
The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano, Robert N. M. Watson |
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jirí Kur, Vashek Matyas, Andriy Stetsko, Petr Svenda |
Attack Detection vs. Privacy - How to Find the Link or How to Hide It? |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze |
One-Way Cryptography (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Yuko Murayama, Yasuhiro Fujihara, Dai Nishioka |
The Sense of Security and a Countermeasure for the False Sense. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Pico: No More Passwords! |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jirí Kur, Andriy Stetsko |
Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001 |
How to Sync with Alice (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson |
How to Keep Bad Papers Out of Conferences (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze |
One-Way Cryptography. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mike Burmester |
His Late Master's Voice (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mike Burmester |
His Late Master's Voice: Barking for Location Privacy. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Pico: No More Passwords! (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bangdao Chen |
When Context Is Better Than Identity (Transcript of Discussion). |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Omar Choudary 0001, Frank Stajano |
Make Noise and Whisper: A Solution to Relay Attacks. |
Security Protocols Workshop |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska (eds.) |
Quantitative and Qualitative Analysis of Network Protocols, 31.01. - 05.02.2010 |
Quantitative and Qualitative Analysis of Network Protocols |
2010 |
DBLP BibTeX RDF |
|
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.) |
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Tobe Toben, Bernd Westphal, Jan-Hendrik Rakow |
Spotlight Abstraction of Agents and Areas. |
Quantitative and Qualitative Analysis of Network Protocols |
2010 |
DBLP BibTeX RDF |
|
21 | Ross J. Anderson |
It's the Anthropology, Stupid! (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Richard Mortier, Anil Madhavapeddy, Theodore Hong, Derek Gordon Murray, Malte Schwarzkopf |
Using Dust Clouds to Enhance Anonymous Communication. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Su-Yang Yu, Jeff Yan |
Security Design in Human Computation Games. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague |
Virtually Perfect Democracy. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Frank Stajano |
It's the Anthropology, Stupid! |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Saad Aloteibi |
On the Value of Hybrid Security Testing (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
Censorship of eBooks (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Security Limitations of Virtualization and How to Overcome Them. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson |
On Storing Private Keys in the Cloud (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong |
Relay-Proof Channels Using UWB Lasers. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Digital Immolation - New Directions for Online Protest. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Dieter Gollmann |
Caught in the Maze of Security Standards (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark, Matt Blaze, Jonathan M. Smith |
Blood in the Water - Are there Honeymoon Effects Outside Software? |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Malte Schwarzkopf |
Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Mauro Conti |
Censorship-Resilient Communications through Information Scattering (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis |
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
Security Design in Human Computation Games (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: Virtually Perfect Security (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Peter Y. A. Ryan |
Virtually Perfect Democracy (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jan Meier, Dieter Gollmann |
Caught in the Maze of Security Standards. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark |
Blood in the Water (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Saad Aloteibi, Frank Stajano |
On the Value of Hybrid Security Testing. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Paulo Veríssimo |
Security Made, Not Perfect, But Automatic. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Recapitulation. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Paulo Veríssimo |
Security Made, Not Perfect, But Automatic (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Alex Shafarenko |
Relay-Proof Channels Using UWB Lasers (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
Censorship of eBooks (Extended Abstract). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury, Bruce Christianson |
More Security or Less Insecurity. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Digital Immolation (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Stefano Ortolani, Mauro Conti, Bruno Crispo |
Censorship-Resilient Communications through Information Scattering. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano |
On Storing Private Keys in the Cloud. |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
More Security or Less Insecurity (Transcript of Discussion). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
Generating Channel Ids in Virtual World Operating Systems (Extended Abstract). |
Security Protocols Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.) |
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Why I'm Not an Entropist. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Peter Y. A. Ryan, Vanessa Teague |
Pretty Good Democracy. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano |
Not That Kind of Friend. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Orson Scott Card |
The Final Word. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze |
Below the Salt. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Stephen William Clarke, Bruce Christianson, Hannan Xiao |
Trust*: Using Local Guarantees to Extend the Reach of Trust. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: Brief Encounters. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis |
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Adrian Perrig, Jun Zhao 0007 |
Brief Encounters with a Random Key Graph. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Why I'm Not an Entropist. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis |
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Xavier Chantry |
Attacking Each Other. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Sören Preibusch |
Establishing Distributed Hidden Friendship Relations. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley, Vivien M. Rooney |
Qualitative Analysis for Trust Management. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Trust*: Using Local Guarantees to Extend the Reach of Trust. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze |
Is the Honeymoon over? |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
The Trust Economy of Brief Encounters. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jirí Kur, Václav Matyás, Petr Svenda |
Evolutionary Design of Attack Strategies. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda |
Evolutionary Design of Attack Strategies. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze, Patrick D. McDaniel |
Below the Salt. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Brief Encounters with a Random Key Graph. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Dusko Pavlovic, Catherine Meadows 0001 |
Deriving Ephemeral Authentication Using Channel Axioms. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Chris J. Mitchell |
A Novel Stateless Authentication Protocol. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley |
Qualitative Analysis for Trust Management. |
Security Protocols Workshop |
2009 |
DBLP DOI BibTeX RDF |
|