|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25318 occurrences of 6008 keywords
|
|
|
Results
Found 34979 publication records. Showing 34979 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Juraj Hromkovic |
Randomized Communication Protocols (A Survey). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAGA ![In: Stochastic Algorithms: Foundations and Applications, International Symposium, SAGA 2001 Berlin, Germany, December 13-14, 2001, Proceedings, pp. 1-32, 2001, Springer, 3-540-43025-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
two-party protocols, communication complexity, Randomized computing |
21 | Bhed Bahadur Bista, Y. Ujiie, K. Furuya, Kaoru Takahashi, Norio Shiratori |
Support System for Constructing Communication Services and Protocols Based on Compositional Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 15-22, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
communication service design, communication protocol design, compositional approach, sequential composition, protocols, LOTOS, service specifications, protocol specifications, parallel composition |
21 | Hisaaki Katagiri, Keiichi Yasumoto, Akira Kitajima, Teruo Higashino, Kenichi Taniguchi |
Hardware implementation of communication protocols modeled by concurrent EFSMs with multi-way synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 37th Conference on Design Automation, Los Angeles, CA, USA, June 5-9, 2000., pp. 762-767, 2000, ACM. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
concurrent EFSMs, mutli-way synchronization, high-level synthesis, communication protocols, LOTOS, Lotos |
21 | Mustaque Ahamad, Rammohan Kordale |
Scalable Consistency Protocols for Distributed Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 10(9), pp. 888-903, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Scalable services, caching, replication, distributed objects, consistency protocols |
21 | Purnendu Sinha, Neeraj Suri |
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 20th IEEE Real-Time Systems Symposium, Phoenix, AZ, USA, December 1-3, 1999, pp. 126-135, 1999, IEEE Computer Society, 0-7695-0475-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Dependable Real-time Protocols, Scheduling, Formal Techniques |
21 | Colin Boyd |
A Class of Flexible and Efficient Key Management Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 2-8, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authentication, key management, secure protocols |
21 | K. H. Kim, Carlos Serro |
Can Real-Time Local Area Network Protocols Be Made Robust? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 324-333, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
CSMA/DCR protocol, Robust real-time protocols, Real-time Local Area Networks, Temporary fault, Link failure, Permanent fault |
21 | Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson (eds.) |
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-031-43032-9 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury |
Towards Human-Centric Endpoint Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 220-227, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Hugenroth |
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 162-173, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya |
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 97-112, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Nicholas Boucher |
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 199-204, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 20-31, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Agata Kruzikova |
Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 57-63, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Arastoo Bozorgi, Jonathan Anderson |
Blind Auditing and Probabilistic Access Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 257-269, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Agata Kruzikova, Vashek Matyas, Milan Broz |
Authentication of IT Professionals in the Wild - A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 43-56, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford |
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 151-161, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Adrian Perrig, David A. Basin |
Determining an Economic Value of High Assurance for Commodity Software Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 228-242, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Alex Shafarenko |
Transporting a Secret Using Destructively-Read Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 32-37, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Nicholas Boucher |
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 205-210, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jenny Blessing |
One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 193-198, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Christelle Gloor |
Trusted Introductions for Secure Messaging (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 136-148, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 3-19, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Alex Shafarenko |
Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 38-42, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid |
Towards Human-Centric Endpoint Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 211-219, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Harry Halpin |
Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 70-77, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Adrian Perrig |
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 243-256, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Christelle Gloor, Adrian Perrig |
Trusted Introductions for Secure Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 123-135, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jenny Blessing, Ross Anderson 0001 |
One Protocol to Rule Them All? On Securing Interoperable Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 174-192, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jessica Monteith |
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 113-122, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Harry Halpin, Andrei Serjantov |
Incentives and Censorship Resistance for Mixnets Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 64-69, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Dougherty, José Meseguer 0001, Sebastian Alexander Mödersheim, Paul D. Rowe (eds.) |
Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![Springer, 978-3-030-91630-5 The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Abigail Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, Shriram Krishnamurthi |
Prototyping Formal Methods Tools: A Protocol Analysis Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 394-413, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | John D. Ramsdell |
Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 355-369, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Prajna Bhandary, Edward Zieglar, Charles Nicholas |
Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 50-76, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Riccardo Focardi, Flaminia L. Luccio |
Secure Key Management Policies in Strand Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 175-197, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do 0001, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele |
A Tutorial-Style Introduction to DY*. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 77-97, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Pierpaolo Degano, Letterio Galletta, Selene Gerali |
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 124-138, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Kangsoo Jung, Sayan Biswas, Catuscia Palamidessi |
Establishing the Price of Privacy in Federated Data Trading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 232-250, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Daniel J. Dougherty |
Model Finding for Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 156-174, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Alessandra Di Pierro, Massimiliano Incudini |
Quantum Machine Learning and Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 139-155, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
On the Complexity of Verification of Time-Sensitive Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 251-275, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad M. Ahmadpanah, Musard Balliu, Daniel Hedin, Lars Eric Olsson, Andrei Sabelfeld |
Securing Node-RED Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 1-21, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Dale M. Johnson |
Formal Methods and Mathematical Intuition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 218-231, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson |
Benign Interaction of Security Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 312-331, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sebastian Mödersheim, Jorge Cuéllar |
Three Branches of Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 293-311, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark |
A Declaration of Software Independence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 198-217, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Dusko Pavlovic |
Probabilistic Annotations for Protocol Models - Dedicated to Joshua Guttman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 332-347, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Principles of Remote Sattestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 414-424, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Sylvan Pinsky |
Joshua Guttman: Pioneering Strand Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 348-354, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Damián Aparicio-Sánchez, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001, Julia Sapiña |
Protocol Analysis with Time and Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 22-49, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Paul D. Rowe |
On Orderings in Security Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Protocols, Strands, and Logic ![In: Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday, pp. 370-393, 2021, Springer, 978-3-030-91630-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás (eds.) |
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-030-57042-2 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Joshua D. Guttman, Carl E. Landwehr, José Meseguer 0001, Dusko Pavlovic (eds.) |
Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![Springer, 978-3-030-19051-4 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza |
Symbolic Timed Trace Equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 89-111, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan K. Millen |
A Long, Slow Conversation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 6-7, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Erin Hanna, Christopher Lynch, David Jaz Myers, Corey Richardson |
Finding Intruder Knowledge with Cap-Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 39-53, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Moses D. Liskov, Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe, F. Javier Thayer |
Enrich-by-Need Protocol Analysis for Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 135-155, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Key Reminiscences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 8-14, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Véronique Cortier, Pierrick Gaudry, Stéphane Glondu |
Belenios: A Simple Private and Verifiable Electronic Voting System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 214-238, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Matteo Busi 0001, Pierpaolo Degano, Letterio Galletta |
Robust Declassification by Incremental Typing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 54-69, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Elisavet Kozyri, Owen Arden, Andrew C. Myers, Fred B. Schneider |
JRIF: Reactive Information Flow Control for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 70-88, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Sylvan Pinsky |
Cathy Meadows: A Central Figure in Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 1-5, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Santiago Escobar 0001, José Meseguer 0001 |
Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 15-38, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 233-241, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov |
Snitches Get Stitches: On the Difficulty of Whistleblowing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 289-303, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Chan Nam Ngo |
Affordable Security or Big Guy vs Small Guy (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 148-156, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Prashant Anantharaman |
Mismorphism: The Heart of the Weird Machine (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 125-131, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Laurent Chuat |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 213-222, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov |
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 304-312, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Laurent Chuat, Sarah Plocher, Adrian Perrig |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 203-212, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 245-257, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vijay Kothari, Michael C. Millian |
Human-Computability Boundaries (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 167-174, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Sasa Radomirovic |
Shaping Our Mental Model of Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 51-59, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vasilios Mavroudis |
Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 104-112, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith |
Mismorphism: The Heart of the Weird Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 113-124, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 267-280, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vasilios Mavroudis |
Bounded Temporal Fairness for FIFO Financial Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 91-103, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lydia Kraus |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 281-288, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov |
Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 41-47, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith |
Human-Computability Boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 157-166, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
Challenges in Designing a Distributed Cryptographic File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 177-192, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov |
Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 20-40, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Diana A. Vasile |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 258-263, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 193-199, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
A Rest Stop on the Unending Road to Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 223-232, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Sasa Radomirovic |
Shaping Our Mental Model of Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers, pp. 60-68, 2019, Springer, 978-3-030-57042-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.) |
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-030-03250-0 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Maverick Woo |
Requirements for Root of Trust Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 192-202, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Graham Rymer, David Llewellyn-Jones |
Raven Authentication Service - Attacks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 1-14, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Kat Krol |
Intentionality and Agency in Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 126-131, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Daniel J. Weitzner |
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 266-279, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | T. Mark A. Lomas |
User Authentication for the Internet of Things (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 214-224, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Erinn Atwater, Ian Goldberg |
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 289-294, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Patrick McCorry, Malte Möser, Syed Taha Ali |
Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 225-233, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Patrick McCorry |
Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 234-242, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Taciane Martimiano, Jean Everson Martina |
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 96-105, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Ross Anderson 0001, Ilia Shumailov, Mansoor Ahmed-Rengers |
Making Bitcoin Legal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 243-253, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano |
Intentionality and Agency in Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 114-125, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Erinn Atwater, Ian Goldberg |
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers, pp. 295-303, 2018, Springer, 978-3-030-03250-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 34979 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|