Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Arash Atashpendar |
Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers, pp. 342-349, 2015, Springer, 978-3-319-26095-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark |
Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers, pp. 183-194, 2015, Springer, 978-3-319-26095-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas |
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers, pp. 139-144, 2015, Springer, 978-3-319-26095-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson (eds.) |
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-319-12399-8 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm (eds.) |
Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-662-45920-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Filip Jurnecka, Martin Stehlík, Vashek Matyás |
On Node Capturing Attacker Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 300-315, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas |
Better Authentication Password Revolution by Evolution (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 146-153, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 116-129, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 359-370, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan |
Remark!: A Secure Protocol for Remote Exams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 38-48, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Henry Tan, Micah Sherr |
Censorship Resistance as a Side-Effect (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 227-238, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore 0002, L. Jean Camp, Kevin Benton, Ross J. Anderson |
Collaborating with the Enemy on Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 154-162, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Vit Bukac, Vaclav Lorenc, Vashek Matyás |
Red Queen's Race: APT Win-Win Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 55-61, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Dieter Gollmann |
Why Bother Securing DNS? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 1-8, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Dieter Gollmann |
Why Bother Securing DNS? (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 9-17, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Shishir Nagaraja |
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 334-339, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Dancing with the Adversary: A Tale of Wimps and Giants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 100-115, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Henry Tan, Micah Sherr |
Censorship Resistance as a Side-Effect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 221-226, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano |
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 197-215, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rosario Giustolisi |
Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 49-54, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 187-196, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley |
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 28-37, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Gardiner, Shishir Nagaraja |
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 321-333, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Jérémie Koenig |
On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 253-262, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Max Spencer |
Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 216-220, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Vit Bukac |
Red Queen's Race: APT Win-Win Game (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 62-68, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury, Bruce Christianson |
Beyond Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 340-344, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Olgierd Pieczul, Simon N. Foley |
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 18-27, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Daniel R. Thomas, Alastair R. Beresford |
Better Authentication: Password Revolution by Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 130-145, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury |
Beyond Trust (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 345-349, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau, Andrew Miller 0001 |
Fawkescoin - A Cryptocurrency Without Public-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 350-358, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yvo Desmedt |
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 286-299, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Aaron D. Jaggard, Rebecca N. Wright |
Strange Bedfellows: How and When to Work with Your Enemy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 263-267, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Joan Feigenbaum, Jérémie Koenig |
On the Feasibility of a Technological Response to the Surveillance Morass. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 239-252, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Rebecca N. Wright |
Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 268-275, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Filip Jurnecka |
On Node Capturing Attacker Strategies (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 316-320, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yvo Desmedt |
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 276-285, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Chris Hall |
Collaborating with the Enemy on Network Management (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 163-171, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington |
Bootstrapping Adoption of the Pico Password Replacement System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers, pp. 172-186, 2014, Springer, 978-3-319-12399-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.) |
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-36212-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau (eds.) |
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-41716-0 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: What's Happening on the Other Channel? (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 1-2, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Rushil Khurana, Shishir Nagaraja |
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 143-151, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Jun Zhao 0007, Virgil D. Gligor, Adrian Perrig, James Newsome |
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 94-114, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie |
Towards a Theory of Application Compartmentalisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 19-27, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Shishir Nagaraja |
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 152-160, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Alec Yasinsac |
Independent Computations for Safe Remote Electronic Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 71-83, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Bergadano |
Communication Setup in Anonymous Messaging (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 170-175, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Dongting Yu |
Authentication for Resilience: The Case of SDN (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 45-53, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford |
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 189-195, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Rubin Xu |
Towards a Stronger Location Integrity (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 180-188, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ariel Stulman |
Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 213-222, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Dongting Yu, Andrew W. Moore 0002, Chris Hall, Ross J. Anderson |
Authentication for Resilience: The Case of SDN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 39-44, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bin B. Zhu, Jeff Yan |
Towards New Security Primitives Based on Hard AI Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 3-10, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Bergadano |
Communication Setup in Anonymous Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 161-169, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda, Václav Matyás |
On the Origin of Yet another Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 223-237, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Mohammed H. Almeshekah |
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 196-201, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda |
On the Origin of Yet another Channel (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 238-244, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Robert N. M. Watson |
Towards a Theory of Application Compartmentalisation (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 28-38, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague |
Verifiable Postal Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 54-65, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 11-18, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001 |
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 255-264, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Vanessa Teague |
End-to-End Verifiable Postal Voting (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 66-70, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001, Dylan Clarke, Carlton Shepherd |
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 245-254, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Alec Yasinsac |
Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 84-93, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ariel Stulman, Jonathan Lahav, Avraham Shmueli |
Spraying Diffie-Hellman for Secure Key Exchange in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 202-212, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 115-122, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Rubin Xu, Dongting Yu |
Towards a Stronger Location Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers, pp. 176-179, 2013, Springer, 978-3-642-41716-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson (eds.) |
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-35693-3 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Todd R. Andel, Alec Yasinsac |
Secure Internet Voting Protocol for Overseas Military Voters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 3-14, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig |
Street-Level Trust Semantics for Attribute Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 96-115, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Todd R. Andel |
Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 15-22, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001, Brian Randell, Dylan Clarke |
Self-enforcing Electronic Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 23-31, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Dylan Clarke |
Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 136-144, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Statistical Metrics for Individual Password Strength (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 87-95, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro |
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 199-213, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001 |
Self-enforcing Electronic Voting (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 32-40, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Mauro Conti |
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 214-222, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 116-125, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Statistical Metrics for Individual Password Strength. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 76-86, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Robert N. M. Watson |
Stayin' Alive: Aliveness as an Alternative to Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 242-250, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson |
Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 251-258, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 231-241, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Shah Mahmood, Yvo Desmedt |
Usable Privacy by Visual and Interactive Control of Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 181-188, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Dylan Clarke, Feng Hao 0001, Brian Randell |
Analysis of Issues and Challenges of E-Voting in the UK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 126-135, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Protocol Governance: The Elite, or the Mob? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 145, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Shah Mahmood |
Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 189-198, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Yuko Murayama |
Usability Issues in Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 172-180, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Oliver Stannard, Frank Stajano |
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 223-230, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Yuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka |
Usability Issues in Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 161-171, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 146-160, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Phillip J. Brooke |
Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 55-59, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Phillip J. Brooke, Richard F. Paige, Christopher Power |
Approaches to Modelling Security Scenarios with Domain-Specific Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers, pp. 41-54, 2012, Springer, 978-3-642-35693-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano (eds.) |
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-25866-4 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.) |
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-22136-1 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mark Dermot Ryan, Ben Smyth |
Applied pi calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 112-142, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Anupam Datta, John C. Mitchell, Arnab Roy 0001, Stephan Hyeonjun Stiller |
Protocol Composition Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 182-221, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi |
Computational Soundness - The Case of Diffie-Hellman Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 277-302, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Steve A. Schneider |
Security Analysis using Rank Functions in CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 258-276, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Véronique Cortier, Steve Kremer |
Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 1-12, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|