Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Tudor Dumitras |
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Jean Everson Martina |
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Ross Anderson 0001 |
Making Bitcoin Legal (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Requirements for Root of Trust Establishment (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano, T. Mark A. Lomas |
User Authentication for the Internet of Things. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Peter Y. A. Ryan |
HoneyPAKEs (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Daniel J. Weitzner |
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala |
HoneyPAKEs. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Graham Rymer |
Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Wanpeng Li, Chris J. Mitchell, Thomas M. Chen |
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu |
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Wanpeng Li |
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Martin Kleppmann |
From Secure Messaging to Secure Collaboration (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford |
From Secure Messaging to Secure Collaboration. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
How Does Match-Fixing Inform Computer Game Security? |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás (eds.) |
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano (eds.) |
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo |
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Thanh Bui, Tuomas Aura |
Key Exchange with the Help of a Public Ledger. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Mark Dermot Ryan |
Making Decryption Accountable. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Peter Y. A. Ryan |
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Paul Wernick, Bruce Christianson, Joseph Spring |
Simulating Perceptions of Security. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Hugo Jonker |
A Security Perspective on Publication Metrics (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi 0001, Julian Williams |
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | A. W. Roscoe 0001, Peter Y. A. Ryan |
Auditable PAKEs: Approaching Fair Exchange Without a TTP. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Hugo Jonker, Sjouke Mauw |
A Security Perspective on Publication Metrics. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Marios O. Choudary |
Security from Disjoint Paths: Is It Possible? (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Chan Nam Ngo |
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Thanh Bui |
Key Exchange with the Help of a Public Ledger (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Paul Wernick |
Simulating Perceptions of Security (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury |
Self Attestation of Things (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Weekes |
Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley |
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Mark Dermot Ryan |
Making Decryption Accountable (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Ross Anderson 0001 |
Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley |
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Dylan Clarke, Syed Taha Ali |
End to End Security is Not Enough. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Milan Broz |
Extending Full Disk Encryption for the Future. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Khaled Baqer |
Reconciling Multiple Objectives - Politics or Markets? |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Milan Broz |
Extending Full Disk Encryption for the Future (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury, Bruce Christianson |
Self Attestation of Things. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Marcus Völp |
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Sergiu Costea, Marios O. Choudary, Costin Raiciu |
Security from Disjoint Paths: Is It Possible? |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Weekes, Shishir Nagaraja |
Controlling Your Neighbour's Bandwidth for Fun and for Profit. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Dylan Clarke |
End to End Security is Not Enough (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Radim Ostádal, Petr Svenda, Vashek Matyás |
Reconsidering Attacker Models in Ad-Hoc Networks. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Brian J. Kidney |
Exploiting Autocorrect to Attack Privacy (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Happe |
Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda |
Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Olgierd Pieczul, Simon N. Foley |
The Evolution of a Security Control. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Hugo Jonker |
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Happe, Stephan Krenn, Thomas Lorünser |
Malicious Clients in Distributed Secret Sharing Based Storage Networks. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
The Price of Belief: Insuring Credible Trust? (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella, Bruce Christianson, Luca Viganò 0001 |
Invisible Security. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
Novel Security and Privacy Perspectives of Camera Fingerprints. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | David Llewellyn-Jones |
Explicit Delegation Using Configurable Cookies (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano |
Explicit Delegation Using Configurable Cookies. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Brian J. Kidney, Jonathan Anderson |
Exploiting Autocorrect to Attack Privacy. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Paul Wernick, Bruce Christianson |
The Price of Belief: Insuring Credible Trust? |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella |
Invisible Security (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano |
Red Button and Yellow Button: Usable Security for Lost Security Tokens. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Olgierd Pieczul, Simon N. Foley |
The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion). |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua |
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Min Suk Kang, Virgil D. Gligor, Vyas Sekar |
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. |
Security Protocols Workshop |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson (eds.) |
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig |
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Radim Ostádal |
Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Syed Taha Ali |
Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella, Luca Viganò 0001 |
Security is Beautiful. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor |
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Paul Wernick, Bruce Christianson |
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past". |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Changyu Dong |
Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Torabi Dashti |
Derailing Attacks (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Vit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas |
Challenges of Fiction in Network Security - Perspective of Virtualized Environments. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Arash Atashpendar, A. W. Roscoe 0001, Peter Y. A. Ryan |
Information Leakage Due to Revealing Randomly Selected Bits. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Sasa Radomirovic, Mohammad Torabi Dashti |
Derailing Attacks. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Syed Taha Ali, Dylan Clarke, Patrick McCorry |
Bitcoin: Perils of an Unregulated Global P2P Currency. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Luca Viganò 0001 |
Security is Beautiful (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Brad Rosen |
On the Use of Security and Privacy Technology as a Plot Device. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Tavish Vaidya, Micah Sherr |
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Changyu Dong |
Efficient Data Intensive Secure Computation: Fictional or Real? |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Khaled Baqer, Ross J. Anderson |
Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Khaled Baqer, Ross J. Anderson |
Do You Believe in Tinker Bell? The Social Externalities of Trust. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark, Matt Blaze, Jonathan M. Smith |
Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Hugo Jonker, Sjouke Mauw, Sasa Radomirovic |
Location-Private Interstellar Communication. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley, Olgierd Pieczul |
The Dark Side of the Code (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Paul Wernick |
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser |
Pico Without Public Keys. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Tavish Vaidya, Micah Sherr |
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum |
On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Olgierd Pieczul, Simon N. Foley |
The Dark Side of the Code. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Pico Without Public Keys (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Sjouke Mauw |
Location-Private Interstellar Communication (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jiangshan Yu, Mark Dermot Ryan |
Device Attacker Models: Fact and Fiction. |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Mark Ryan 0001 |
Device Attacker Models: Fact and Fiction (Transcript of Discussion). |
Security Protocols Workshop |
2015 |
DBLP DOI BibTeX RDF |
|