default search action
28th Security Protocols Workshop 2023: Cambridge, UK
- Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14186, Springer 2023, ISBN 978-3-031-43032-9
Securing the Human Endpoint
- Frank Stajano:
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). 3-19 - Frank Stajano:
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). 20-31 - Bruce Christianson, Alex Shafarenko:
Transporting a Secret Using Destructively-Read Memory. 32-37 - Alex Shafarenko:
Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion). 38-42 - Agata Kruzikova, Vashek Matyas, Milan Broz:
Authentication of IT Professionals in the Wild - A Survey. 43-56 - Agata Kruzikova:
Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion). 57-63 - Harry Halpin, Andrei Serjantov:
Incentives and Censorship Resistance for Mixnets Revisited. 64-69 - Harry Halpin:
Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion). 70-77 - Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford:
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. 78-88 - Kieron Ivy Turk:
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). 89-96 - Jessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya:
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches. 97-112 - Jessica Monteith:
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion). 113-122 - Christelle Gloor, Adrian Perrig:
Trusted Introductions for Secure Messaging. 123-135 - Christelle Gloor:
Trusted Introductions for Secure Messaging (Transcript of Discussion). 136-148
Proving Humans Correct
- Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford:
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. 151-161 - Daniel Hugenroth:
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion). 162-173 - Jenny Blessing, Ross Anderson:
One Protocol to Rule Them All? On Securing Interoperable Messaging. 174-192 - Jenny Blessing:
One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion). 193-198 - Ross J. Anderson, Nicholas Boucher:
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. 199-204 - Ross J. Anderson, Nicholas Boucher:
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). 205-210 - Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid:
Towards Human-Centric Endpoint Security. 211-219 - Partha Das Chowdhury:
Towards Human-Centric Endpoint Security (Transcript of Discussion). 220-227 - Virgil D. Gligor, Adrian Perrig, David A. Basin:
Determining an Economic Value of High Assurance for Commodity Software Security. 228-242 - Adrian Perrig:
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). 243-256 - Arastoo Bozorgi, Jonathan Anderson:
Blind Auditing and Probabilistic Access Controls. 257-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.