default search action
13. Security Protocols Workshop 2005: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4631, Springer 2007, ISBN 978-3-540-77155-5 - Bruce Christianson:
The System Likes You. 1-2 - Tuomas Aura, Michael Roe, Anish Mohammed:
Experiences with Host-to-Host IPsec. 3-22 - Tuomas Aura:
Experiences with Host-to-Host IPsec. 23-30 - Ford-Long Wong, Frank Stajano, Jolyon Clulow:
Repairing the Bluetooth Pairing Protocol. 31-45 - Frank Stajano:
Repairing the Bluetooth Pairing Protocol. 46-50 - Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum:
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags. 51-59 - Melanie R. Rieback:
Keep on Blockin' in the Free World. 60-68 - Daniel Cvrcek, Jan Krhovjak, Vashek Matyas:
PIN (and Chip) or Signature: Beating the Cheating? 69-75 - Vashek Matyas:
PIN (and Chip) or Signature: Beating the Cheating? 76-81 - Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). 82-88 - Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). 89-96 - Simon N. Foley, Hongbin Zhou:
Authorisation Subterfuge by Delegation in Decentralised Networks. 97-102 - Simon N. Foley:
Authorisation Subterfuge by Delegation in Decentralised Networks. 103-111 - Ford-Long Wong, Frank Stajano:
Multi-channel Protocols. 112-127 - Ford-Long Wong:
Multi-channel Protocols. 128-132 - Feng Hao:
Combining Crypto with Biometrics: A New Human-Security Interface. 133-138 - Liqun Chen, Hoon Wei Lim, Wenbo Mao:
User-Friendly Grid Security Architecture and Protocols. 139-156 - Hoon Wei Lim:
User-Friendly Grid Security Architecture and Protocols. 157-161 - Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Austin Donnelly:
Countering Automated Exploits with System Security CAPTCHAS. 162-169 - Alf Zugenmaier:
Countering Automated Exploits with System Security CAPTCHAS. 170-179 - T. Mark A. Lomas:
The System Likes You? 180-186 - Jari Arkko, Pekka Nikander, Mats Näslund:
Enhancing Privacy with Shared Pseudo Random Sequences. 187-196 - Pekka Nikander:
Enhancing Privacy with Shared Pseudo Random Sequences. 197-203 - Michael Roe:
Non-repudiation and the Metaphysics of Presence. 204-206 - Michael Roe:
Non-repudiation and the Metaphysics of Presence. 207-214 - Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly. 215-219 - Yvo Desmedt:
Understanding Why Some Network Protocols Are User-Unfriendly. 220-227 - Mike Burmester, Breno de Medeiros, Alec Yasinsac:
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. 228-237 - Breno de Medeiros:
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. 238-244 - Eric Cronin, Micah Sherr, Matt Blaze:
Listen Too Closely and You May Be Confused. 245-249 - Matt Blaze:
Listen Too Closely and You May Be Confused. 250-257 - Mike Bond, George Danezis:
The Dining Freemasons (Security Protocols for Secret Societies). 258-265 - Mike Bond:
The Dining Freemasons (Security Protocols for Secret Societies). 266-275 - Virgil D. Gligor:
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike). 276-283 - Ben Laurie:
Safer Scripting Through Precompilation. 284-288 - Ben Laurie:
Safer Scripting Through Precompilation. 289-294 - Matthew Johnson, Frank Stajano:
Implementing a Multi-hat PDA. 295-307 - Matthew Johnson:
Implementing a Multi-hat PDA. 308-314 - Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Context Based Role Activation Mechanism. 315-321 - Bruce Christianson:
Anonymous Context Based Role Activation Mechanism. 322-328 - Shishir Nagaraja:
Topology of Covert Conflict. 329-332 - Ross J. Anderson:
The Initial Costs and Maintenance Costs of Protocols. 333-335 - Ross J. Anderson:
The Initial Costs and Maintenance Costs of Protocols. 336-343 - John Gordon:
Alice and Bob. 344-345
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.