![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2019.bht:"
@proceedings{DBLP:conf/spw/2019, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57043-9}, doi = {10.1007/978-3-030-57043-9}, isbn = {978-3-030-57042-2}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ahmed-RengersAH19, author = {Mansoor Ahmed{-}Rengers and Ross J. Anderson and Darija Halatova and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Snitches Get Stitches: On the Difficulty of Whistleblowing}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {289--303}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_27}, doi = {10.1007/978-3-030-57043-9\_27}, timestamp = {Mon, 24 Aug 2020 16:33:11 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ahmed-RengersAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ahmed-RengersAH19a, author = {Mansoor Ahmed{-}Rengers and Ross J. Anderson and Darija Halatova and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {304--312}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_28}, doi = {10.1007/978-3-030-57043-9\_28}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ahmed-RengersAH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anantharaman19, author = {Prashant Anantharaman}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Mismorphism: The Heart of the Weird Machine (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {125--131}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_12}, doi = {10.1007/978-3-030-57043-9\_12}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anantharaman19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AnantharamanKBJ19, author = {Prashant Anantharaman and Vijay H. Kothari and J. Peter Brady and Ira Ray Jenkins and Sameed Ali and Michael C. Millian and Ross Koppel and Jim Blythe and Sergey Bratus and Sean W. Smith}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Mismorphism: The Heart of the Weird Machine}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {113--124}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_11}, doi = {10.1007/978-3-030-57043-9\_11}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AnantharamanKBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BozorgiJA19, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Challenges in Designing a Distributed Cryptographic File System}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {177--192}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_17}, doi = {10.1007/978-3-030-57043-9\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BozorgiJA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BozorgiJA19a, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {193--199}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_18}, doi = {10.1007/978-3-030-57043-9\_18}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BozorgiJA19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chuat19, author = {Laurent Chuat}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {213--222}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_20}, doi = {10.1007/978-3-030-57043-9\_20}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chuat19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChuatPP19, author = {Laurent Chuat and Sarah Plocher and Adrian Perrig}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {203--212}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_19}, doi = {10.1007/978-3-030-57043-9\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ChuatPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyR19, author = {Simon N. Foley and Vivien M. Rooney}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Social Constructionism in Security Protocols - {A} Position on Human Experience, Psychology and Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {69--81}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_7}, doi = {10.1007/978-3-030-57043-9\_7}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyR19a, author = {Simon N. Foley and Vivien M. Rooney}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Social Constructionism in Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {82--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_8}, doi = {10.1007/978-3-030-57043-9\_8}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FrioloMN019, author = {Daniele Friolo and Fabio Massacci and Chan Nam Ngo and Daniele Venturi}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {135--147}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_13}, doi = {10.1007/978-3-030-57043-9\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FrioloMN019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor19, author = {Virgil D. Gligor}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Rest Stop on the Unending Road to Provable Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {223--232}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_21}, doi = {10.1007/978-3-030-57043-9\_21}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor19a, author = {Virgil D. Gligor}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {233--241}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_22}, doi = {10.1007/978-3-030-57043-9\_22}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HicksM19, author = {Alexander Hicks and Steven J. Murdoch}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Transparency Enhancing Technologies to Make Security Protocols Work for Humans}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {3--10}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_1}, doi = {10.1007/978-3-030-57043-9\_1}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HicksM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KothariAJMBABBK19, author = {Vijay H. Kothari and Prashant Anantharaman and Ira Ray Jenkins and Michael C. Millian and J. Peter Brady and Sameed Ali and Sergey Bratus and Jim Blythe and Ross Koppel and Sean W. Smith}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Human-Computability Boundaries}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {157--166}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_15}, doi = {10.1007/978-3-030-57043-9\_15}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KothariAJMBABBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KothariM19, author = {Vijay Kothari and Michael C. Millian}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Human-Computability Boundaries (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {167--174}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_16}, doi = {10.1007/978-3-030-57043-9\_16}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KothariM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kraus19, author = {Lydia Kraus}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Evolution of {SSL/TLS} Indicators and Warnings in Web Browsers (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {281--288}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_26}, doi = {10.1007/978-3-030-57043-9\_26}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kraus19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KrausUMF19, author = {Lydia Kraus and Martin Ukrop and Vashek Matyas and Tobias Fiebig}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Evolution of {SSL/TLS} Indicators and Warnings in Web Browsers}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {267--280}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_25}, doi = {10.1007/978-3-030-57043-9\_25}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KrausUMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19, author = {Vasilios Mavroudis}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {91--103}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_9}, doi = {10.1007/978-3-030-57043-9\_9}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19a, author = {Vasilios Mavroudis}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {104--112}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_10}, doi = {10.1007/978-3-030-57043-9\_10}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murdoch19, author = {Steven J. Murdoch}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {11--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_2}, doi = {10.1007/978-3-030-57043-9\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murdoch19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ngo19, author = {Chan Nam Ngo}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Affordable Security or Big Guy vs Small Guy (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {148--156}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_14}, doi = {10.1007/978-3-030-57043-9\_14}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ngo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Radomirovic19, author = {Sasa Radomirovic}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Shaping Our Mental Model of Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {51--59}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_5}, doi = {10.1007/978-3-030-57043-9\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Radomirovic19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Radomirovic19a, author = {Sasa Radomirovic}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Shaping Our Mental Model of Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {60--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_6}, doi = {10.1007/978-3-030-57043-9\_6}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Radomirovic19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ReinheimerIS19, author = {Benjamin Maximilian Reinheimer and Fairooz Islam and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Audio {CAPTCHA} with a Few Cocktails: It's so Noisy {I} Can't Hear You}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {20--40}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_3}, doi = {10.1007/978-3-030-57043-9\_3}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ReinheimerIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ReinheimerIS19a, author = {Benjamin Maximilian Reinheimer and Fairooz Islam and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Audio {CAPTCHA} with a Few Cocktails: It's So Noisy {I} Can't Hear You (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {41--47}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_4}, doi = {10.1007/978-3-030-57043-9\_4}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ReinheimerIS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Vasile19, author = {Diana A. Vasile}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {258--263}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_24}, doi = {10.1007/978-3-030-57043-9\_24}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Vasile19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VasileKTB19, author = {Diana A. Vasile and Martin Kleppmann and Daniel R. Thomas and Alastair R. Beresford}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Ghost Trace on the Wire? Using Key Evidence for Informed Decisions}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {245--257}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_23}, doi = {10.1007/978-3-030-57043-9\_23}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VasileKTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.