


default search action
22. Security Protocols Workshop 2014: Cambridge, UK
- Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda
, Frank Stajano, Jonathan Anderson
:
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers. Lecture Notes in Computer Science 8809, Springer 2014, ISBN 978-3-319-12399-8 - Dieter Gollmann:
Why Bother Securing DNS? 1-8 - Dieter Gollmann:
Why Bother Securing DNS? (Transcript of Discussion). 9-17 - Olgierd Pieczul, Simon N. Foley
:
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner. 18-27 - Simon N. Foley
:
Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion). 28-37 - Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
Remark!: A Secure Protocol for Remote Exams. 38-48 - Rosario Giustolisi:
Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion). 49-54 - Vit Bukac, Vaclav Lorenc, Vashek Matyás:
Red Queen's Race: APT Win-Win Game. 55-61 - Vit Bukac:
Red Queen's Race: APT Win-Win Game (Transcript of Discussion). 62-68 - Michele Peroli, Luca Viganò, Matteo Zavatteri
:
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). 69-90 - Luca Viganò:
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion). 91-99 - Virgil D. Gligor:
Dancing with the Adversary: A Tale of Wimps and Giants. 100-115 - Virgil D. Gligor:
Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion). 116-129 - Daniel R. Thomas
, Alastair R. Beresford:
Better Authentication: Password Revolution by Evolution. 130-145 - Daniel R. Thomas
:
Better Authentication Password Revolution by Evolution (Transcript of Discussion). 146-153 - Chris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore
, L. Jean Camp, Kevin Benton, Ross J. Anderson:
Collaborating with the Enemy on Network Management. 154-162 - Ross J. Anderson, Chris Hall:
Collaborating with the Enemy on Network Management (Transcript of Discussion). 163-171 - Frank Stajano, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington:
Bootstrapping Adoption of the Pico Password Replacement System. 172-186 - Frank Stajano:
Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion). 187-196 - Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano:
I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes. 197-215 - Max Spencer:
Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion). 216-220 - Henry Tan, Micah Sherr:
Censorship Resistance as a Side-Effect. 221-226 - Henry Tan, Micah Sherr:
Censorship Resistance as a Side-Effect (Transcript of Discussion). 227-238 - Joan Feigenbaum, Jérémie Koenig
:
On the Feasibility of a Technological Response to the Surveillance Morass. 239-252 - Joan Feigenbaum, Jérémie Koenig:
On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion). 253-262 - Aaron D. Jaggard
, Rebecca N. Wright:
Strange Bedfellows: How and When to Work with Your Enemy. 263-267 - Rebecca N. Wright:
Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion). 268-275 - Yvo Desmedt:
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions. 276-285 - Yvo Desmedt:
On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion). 286-299 - Filip Jurnecka, Martin Stehlík, Vashek Matyás:
On Node Capturing Attacker Strategies. 300-315 - Filip Jurnecka:
On Node Capturing Attacker Strategies (Transcript of Discussion). 316-320 - Joseph Gardiner, Shishir Nagaraja:
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis. 321-333 - Shishir Nagaraja:
On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion). 334-339 - Partha Das Chowdhury, Bruce Christianson
:
Beyond Trust. 340-344 - Partha Das Chowdhury:
Beyond Trust (Transcript of Discussion). 345-349 - Joseph Bonneau, Andrew Miller:
Fawkescoin - A Cryptocurrency Without Public-Key Cryptography. 350-358 - Joseph Bonneau:
FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion). 359-370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.