default search action
20. Security Protocols Workshop 2012: Cambridge, UK
- Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7622, Springer 2012, ISBN 978-3-642-35693-3 - Bruce Christianson:
Introduction: Bringing Protocols to Life (Transcript of Discussion). 1-2 - Todd R. Andel, Alec Yasinsac:
Secure Internet Voting Protocol for Overseas Military Voters. 3-14 - Todd R. Andel:
Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion). 15-22 - Feng Hao, Brian Randell, Dylan Clarke:
Self-enforcing Electronic Voting. 23-31 - Feng Hao:
Self-enforcing Electronic Voting (Transcript of Discussion). 32-40 - Phillip J. Brooke, Richard F. Paige, Christopher Power:
Approaches to Modelling Security Scenarios with Domain-Specific Languages. 41-54 - Phillip J. Brooke:
Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion). 55-59 - Sandy Clark, Matt Blaze, Jonathan M. Smith:
The Casino and the OODA Loop - Why Our Protocols Always Eventually Fail. 60-63 - Matt Blaze:
The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion). 64-75 - Joseph Bonneau:
Statistical Metrics for Individual Password Strength. 76-86 - Joseph Bonneau:
Statistical Metrics for Individual Password Strength (Transcript of Discussion). 87-95 - Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
Street-Level Trust Semantics for Attribute Authentication. 96-115 - Virgil D. Gligor:
Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion). 116-125 - Dylan Clarke, Feng Hao, Brian Randell:
Analysis of Issues and Challenges of E-Voting in the UK. 126-135 - Dylan Clarke:
Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion). 136-144 - Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? 145 - Ross J. Anderson:
Protocol Governance: The Elite, or the Mob? (Transcript of Discussion). 146-160 - Yuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka:
Usability Issues in Security. 161-171 - Yuko Murayama:
Usability Issues in Security (Transcript of Discussion). 172-180 - Shah Mahmood, Yvo Desmedt:
Usable Privacy by Visual and Interactive Control of Information Flow. 181-188 - Shah Mahmood:
Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion). 189-198 - Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro:
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. 199-213 - Mauro Conti:
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion). 214-222 - Oliver Stannard, Frank Stajano:
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices. 223-230 - Frank Stajano:
Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion). 231-241 - Jonathan Anderson, Robert N. M. Watson:
Stayin' Alive: Aliveness as an Alternative to Authentication. 242-250 - Jonathan Anderson:
Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion). 251-258 - Paul Syverson:
Paul Revere Protocols. 259-266 - Paul Syverson:
Paul Revere Protocols (Transcript of Discussion). 267-275
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.