default search action
23. Security Protocols Workshop 2015: Cambridge, UK
- Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 - Olgierd Pieczul, Simon N. Foley:
The Dark Side of the Code. 1-11 - Simon N. Foley, Olgierd Pieczul:
The Dark Side of the Code (Transcript of Discussion). 12-21 - Keith Irwin:
Redesigning Secure Protocols to Compel Security Checks. 22-29 - Keith Irwin:
Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion). 30-40 - Sasa Radomirovic, Mohammad Torabi Dashti:
Derailing Attacks. 41-46 - Mohammad Torabi Dashti:
Derailing Attacks (Transcript of Discussion). 47-49 - Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. 50-68 - Virgil D. Gligor:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). 69-79 - Tavish Vaidya, Micah Sherr:
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones. 80-90 - Tavish Vaidya, Micah Sherr:
Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion). 91-104 - Hugo Jonker, Sjouke Mauw, Sasa Radomirovic:
Location-Private Interstellar Communication. 105-115 - Sjouke Mauw:
Location-Private Interstellar Communication (Transcript of Discussion). 116-125 - Daniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor:
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface. 126-138 - Daniel R. Thomas:
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion). 139-144 - Vit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas:
Challenges of Fiction in Network Security - Perspective of Virtualized Environments. 145-151 - Radim Ostádal:
Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion). 152-157 - Jiangshan Yu, Mark Dermot Ryan:
Device Attacker Models: Fact and Fiction. 158-167 - Mark Ryan:
Device Attacker Models: Fact and Fiction (Transcript of Discussion). 168-177 - Sandy Clark, Matt Blaze, Jonathan M. Smith:
Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. 178-182 - Sandy Clark:
Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion). 183-194 - Frank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser:
Pico Without Public Keys. 195-211 - Frank Stajano:
Pico Without Public Keys (Transcript of Discussion). 212-223 - Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust. 224-236 - Khaled Baqer, Ross J. Anderson:
Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). 237-246 - Giampaolo Bella, Luca Viganò:
Security is Beautiful. 247-250 - Luca Viganò:
Security is Beautiful (Transcript of Discussion). 251-260 - Joan Feigenbaum, Brad Rosen:
On the Use of Security and Privacy Technology as a Plot Device. 261-275 - Joan Feigenbaum:
On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion). 276-282 - Syed Taha Ali, Dylan Clarke, Patrick McCorry:
Bitcoin: Perils of an Unregulated Global P2P Currency. 283-293 - Syed Taha Ali:
Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion). 294-306 - Paul Wernick, Bruce Christianson:
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past". 307-313 - Paul Wernick:
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion). 314-324 - Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan:
Information Leakage Due to Revealing Randomly Selected Bits. 325-341 - Arash Atashpendar:
Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion). 342-349 - Changyu Dong:
Efficient Data Intensive Secure Computation: Fictional or Real? 350-360 - Changyu Dong:
Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion). 361-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.