default search action
24. Security Protocols Workshop 2016: Brno, Czech Republic
- Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano:
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10368, Springer 2017, ISBN 978-3-319-62032-9 - Giampaolo Bella, Bruce Christianson, Luca Viganò:
Invisible Security. 1-9 - Giampaolo Bella:
Invisible Security (Transcript of Discussion). 10-18 - Hugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't. 19-25 - Hugo Jonker:
Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion). 26-34 - Paul Wernick, Bruce Christianson:
The Price of Belief: Insuring Credible Trust? 35-38 - Bruce Christianson:
The Price of Belief: Insuring Credible Trust? (Transcript of Discussion). 39-46 - Min Suk Kang, Virgil D. Gligor, Vyas Sekar:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents. 47-57 - Virgil D. Gligor:
Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion). 58-66 - Olgierd Pieczul, Simon N. Foley:
The Evolution of a Security Control. 67-84 - Olgierd Pieczul, Simon N. Foley:
The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion). 85-89 - Jeff Yan:
Novel Security and Privacy Perspectives of Camera Fingerprints. 90-95 - Jeff Yan:
Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion). 96-102 - Brian J. Kidney, Jonathan Anderson:
Exploiting Autocorrect to Attack Privacy. 103-109 - Brian J. Kidney:
Exploiting Autocorrect to Attack Privacy (Transcript of Discussion). 110-118 - Khaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn:
SMAPs: Short Message Authentication Protocols. 119-132 - Khaled Baqer, Ross J. Anderson:
SMAPs: Short Message Authentication Protocols (Transcript of Discussion). 133-140 - David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano:
Explicit Delegation Using Configurable Cookies. 141-152 - David Llewellyn-Jones:
Explicit Delegation Using Configurable Cookies (Transcript of Discussion). 153-164 - Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens. 165-171 - Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion). 172-180 - A. W. Roscoe:
Detecting Failed Attacks on Human-Interactive Security Protocols. 181-197 - A. W. Roscoe:
Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion). 198-205 - Andreas Happe, Stephan Krenn, Thomas Lorünser:
Malicious Clients in Distributed Secret Sharing Based Storage Networks. 206-214 - Andreas Happe:
Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion). 215-218 - Radim Ostádal, Petr Svenda, Vashek Matyás:
Reconsidering Attacker Models in Ad-Hoc Networks. 219-227 - Petr Svenda:
Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion). 228-231
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.