Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Joshua D. Guttman |
Shapes: Surveying Crypto Protocol Runs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 222-257, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen |
Constraint solving techniques and enriching the model with equational theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 35-61, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Michaël Rusinowitch, Mathieu Turuani |
Verifying a bounded number of sessions and its complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Models and Techniques for Analyzing Security Protocols ![In: Formal Models and Techniques for Analyzing Security Protocols, pp. 13-34, 2011, IOS Press, 978-1-60750-713-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 98-104, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 243-257, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bangdao Chen, Long Hoang Nguyen 0001, Andrew William Roscoe |
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 115-125, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alf Zugenmaier |
Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 156-169, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Can We Fix the Security Economics of Federated Authentication? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 25-32, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
The Metaplace Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 313-326, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: Alice Doesn't Live Here Anymore (Transcript). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 1-3, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
The Metaplace Security Model (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 327-335, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau, Rubin Xu |
Scrambling for Lightweight Censorship Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 296-302, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sjouke Mauw |
Selective Location Blinding Using Hash Chains (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 142-149, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Gabriele Lenzini, Sjouke Mauw, Jun Pang 0001 |
Selective Location Blinding Using Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 132-141, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Omar Choudary 0001 |
Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 284-295, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Getting Web Authentication Right (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 105-114, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alex Shafarenko |
Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 260-270, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Rubin Xu |
Scrambling for Lightweight Censorship Resistance (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 303-312, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alexander V. Shafarenko, Bruce Christianson |
Gearing Up: How to Eat Your Cryptocake and Still Have It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 258-259, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Alf Zugenmaier |
Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 150-155, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001, Peter Y. A. Ryan |
How to Sync with Alice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 170-178, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Jeannette M. Wing |
Towards a Theory of Trust in Networks of Humans and Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 223-242, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 33-48, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | James Malcolm |
The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 215-222, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano, Robert N. M. Watson |
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 359-367, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jirí Kur, Vashek Matyas, Andriy Stetsko, Petr Svenda |
Attack Detection vs. Privacy - How to Find the Link or How to Hide It? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 189-199, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze |
One-Way Cryptography (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 341-358, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Yuko Murayama, Yasuhiro Fujihara, Dai Nishioka |
The Sense of Security and a Countermeasure for the False Sense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 205-214, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Pico: No More Passwords! ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 49-81, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jirí Kur, Andriy Stetsko |
Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 200-204, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Feng Hao 0001 |
How to Sync with Alice (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 179-188, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson |
How to Keep Bad Papers Out of Conferences (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 368-380, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze |
One-Way Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 336-340, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mike Burmester |
His Late Master's Voice (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 15-24, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mike Burmester |
His Late Master's Voice: Barking for Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 4-14, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Frank Stajano |
Pico: No More Passwords! (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 82-97, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bangdao Chen |
When Context Is Better Than Identity (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 126-131, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Omar Choudary 0001, Frank Stajano |
Make Noise and Whisper: A Solution to Relay Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, pp. 271-283, 2011, Springer, 978-3-642-25866-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Bengt Jonsson 0001, Jörg Kreiker, Marta Z. Kwiatkowska (eds.) |
Quantitative and Qualitative Analysis of Network Protocols, 31.01. - 05.02.2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantitative and Qualitative Analysis of Network Protocols ![Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.) |
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-17772-9 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Tobe Toben, Bernd Westphal, Jan-Hendrik Rakow |
Spotlight Abstraction of Agents and Areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantitative and Qualitative Analysis of Network Protocols ![In: Quantitative and Qualitative Analysis of Network Protocols, 31.01. - 05.02.2010, 2010, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
21 | Ross J. Anderson |
It's the Anthropology, Stupid! (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 131-141, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Richard Mortier, Anil Madhavapeddy, Theodore Hong, Derek Gordon Murray, Malte Schwarzkopf |
Using Dust Clouds to Enhance Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 54-59, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Su-Yang Yu, Jeff Yan |
Security Design in Human Computation Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 142-153, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague |
Virtually Perfect Democracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 161-166, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 252-265, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson, Frank Stajano |
It's the Anthropology, Stupid! ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 127-130, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Saad Aloteibi |
On the Value of Hybrid Security Testing (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 214-216, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
Censorship of eBooks (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 200-206, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Security Limitations of Virtualization and How to Overcome Them. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 233-251, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson |
On Storing Private Keys in the Cloud (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 107-114, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong |
Relay-Proof Channels Using UWB Lasers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 45-46, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Digital Immolation - New Directions for Online Protest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 25-33, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Dieter Gollmann |
Caught in the Maze of Security Standards (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 4-11, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark, Matt Blaze, Jonathan M. Smith |
Blood in the Water - Are there Honeymoon Effects Outside Software? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 12-17, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Malte Schwarzkopf |
Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 60-70, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Mauro Conti |
Censorship-Resilient Communications through Information Scattering (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 90-97, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis |
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 74-81, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jeff Yan |
Security Design in Human Computation Games (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 154-160, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: Virtually Perfect Security (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 1-2, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Peter Y. A. Ryan |
Virtually Perfect Democracy (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 167-174, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jan Meier, Dieter Gollmann |
Caught in the Maze of Security Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 3, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Sandy Clark |
Blood in the Water (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 18-24, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Saad Aloteibi, Frank Stajano |
On the Value of Hybrid Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 207-213, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Paulo Veríssimo |
Security Made, Not Perfect, But Automatic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 217-223, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Recapitulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 266, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Paulo Veríssimo |
Security Made, Not Perfect, But Automatic (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 224-232, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Alex Shafarenko |
Relay-Proof Channels Using UWB Lasers (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 47-53, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
Censorship of eBooks (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 191-199, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Partha Das Chowdhury, Bruce Christianson |
More Security or Less Insecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 115-119, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Joseph Bonneau |
Digital Immolation (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 34-44, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Stefano Ortolani, Mauro Conti, Bruno Crispo |
Censorship-Resilient Communications through Information Scattering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 82-89, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano |
On Storing Private Keys in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 98-106, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
More Security or Less Insecurity (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 120-126, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Michael Roe |
Generating Channel Ids in Virtual World Operating Systems (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, pp. 71-73, 2010, Springer, 978-3-662-45920-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.) |
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![Springer, 978-3-642-04903-3 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Why I'm Not an Entropist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 213-230, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Peter Y. A. Ryan, Vanessa Teague |
Pretty Good Democracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 111-130, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Anderson, Frank Stajano |
Not That Kind of Friend. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 343-349, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Orson Scott Card |
The Final Word. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 365, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze |
Below the Salt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 34-40, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Stephen William Clarke, Bruce Christianson, Hannan Xiao |
Trust*: Using Local Guarantees to Extend the Reach of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 171-178, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Introduction: Brief Encounters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 1-2, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis |
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 87-92, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor, Adrian Perrig, Jun Zhao 0007 |
Brief Encounters with a Random Key Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 157-161, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Paul Syverson |
Why I'm Not an Entropist. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 231-239, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | George Danezis |
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 93-110, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Xavier Chantry |
Attacking Each Other. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 48-50, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Sören Preibusch |
Establishing Distributed Hidden Friendship Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 335-342, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley, Vivien M. Rooney |
Qualitative Analysis for Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 298-307, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Bruce Christianson |
Trust*: Using Local Guarantees to Extend the Reach of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 179-188, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze |
Is the Honeymoon over? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 28-33, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ross J. Anderson |
The Trust Economy of Brief Encounters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 285-297, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jirí Kur, Václav Matyás, Petr Svenda |
Evolutionary Design of Attack Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 3-17, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Petr Svenda |
Evolutionary Design of Attack Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 18-23, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Matt Blaze, Patrick D. McDaniel |
Below the Salt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 24-27, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Virgil D. Gligor |
Brief Encounters with a Random Key Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 162-170, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Dusko Pavlovic, Catherine Meadows 0001 |
Deriving Ephemeral Authentication Using Channel Axioms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 240-261, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Chris J. Mitchell |
A Novel Stateless Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 275-281, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Simon N. Foley |
Qualitative Analysis for Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers, pp. 308-320, 2009, Springer, 978-3-642-36212-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|