![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
15. Security Protocols Workshop 2007: Brno, Czech Republic
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 - Bruce Christianson
:
When Is a Protocol Broken? (Transcript of Discussion). 1-2 - Micah Sherr, Eric Cronin, Matt Blaze:
Measurable Security through Isotropic Channels. 3-12 - Micah Sherr:
Measurable Security through Isotropic Channels (Transcript of Discussion). 13-19 - Amerson Lin, Mike Bond, Jolyon Clulow:
Modeling Partial Attacks with Alloy. 20-33 - Amerson Lin:
Modeling Partial Attacks with Alloy (Transcript of Discussion). 34-36 - Marcus C. Granado:
Resiliency Aspects of Security Protocols. 37-57 - Shishir Nagaraja:
Privacy Amplification with Social Networks. 58-73 - Shishir Nagaraja:
Privacy Amplification with Social Networks (Transcript of Discussion). 74-80 - Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski:
Reconciling Multiple IPsec and Firewall Policies. 81-97 - Michael Roe:
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion). 98-103 - Alf Zugenmaier, Julien Laganier, Anand R. Prasad, Kristian Slavov:
Anchor-Less Secure Session Mobility. 104-109 - Alf Zugenmaier:
Anchor-Less Secure Session Mobility (Transcript of Discussion). 110-113 - Thomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan
:
A Model for System-Based Analysis of Voting Systems. 114-130 - Thomas Tjøstheim:
A Model for System-Based Analysis of Voting Systems (Transcript of Discussion). 131-132 - Bruce Christianson
, Jun Li:
Multi-Channel Key Agreement Using Encrypted Public Key Exchange. 133-138 - Bruce Christianson:
Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion). 139-146 - Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross J. Anderson, Ronald L. Rivest:
On the Security of the EMV Secure Messaging API (Extended Abstract). 147-149 - Jolyon Clulow:
On the Security of the EMV Secure Messaging API (Transcript of Discussion). 150-151 - Jaap-Henk Hoepman:
Distributed Double Spending Prevention. 152-165 - Jaap-Henk Hoepman:
Distributed Double Spending Prevention (Transcript of Discussion). 166-170 - Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, Ross J. Anderson:
Robbing the Bank with a Theorem Prover - (Abstract). 171 - Jolyon Clulow:
Robbing the Bank with a Theorem Prover - (Transcript of Discussion). 172-177 - Haruno Kataoka, Akira Utsumi, Yuki Hirose, Hiroshi Yoshiura:
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet. 178-188 - Hiroshi Yoshiura:
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion). 189-190 - Alec Yasinsac, Jeffrey Todd McDonald:
Towards Working with Small Atomic Functions. 191-200 - Alec Yasinsac:
Towards Working with Small Atomic Functions - (Transcript of Discussion). 201-203 - Wenbo Mao, Fei Yan, Chuanjiang Yi, Haibo Chen:
Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment. 204-221 - George Danezis, Ben Laurie:
Private Yet Abuse Resistant Open Publishing. 222-243 - George Danezis:
Private Yet Abuse Resistant Open Publishing (Transcript of Discussion). 244-255 - Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. 256
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.