default search action
21. Security Protocols Workshop 2013: Cambridge, UK
- Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 - Bruce Christianson:
Introduction: What's Happening on the Other Channel? (Transcript of Discussion). 1-2 - Bin B. Zhu, Jeff Yan:
Towards New Security Primitives Based on Hard AI Problems. 3-10 - Jeff Yan:
Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). 11-18 - Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. 19-27 - Robert N. M. Watson:
Towards a Theory of Application Compartmentalisation (Transcript of Discussion). 28-38 - Dongting Yu, Andrew W. Moore, Chris Hall, Ross J. Anderson:
Authentication for Resilience: The Case of SDN. 39-44 - Dongting Yu:
Authentication for Resilience: The Case of SDN (Transcript of Discussion). 45-53 - Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague:
Verifiable Postal Voting. 54-65 - Vanessa Teague:
End-to-End Verifiable Postal Voting (Transcript of Discussion). 66-70 - Alec Yasinsac:
Independent Computations for Safe Remote Electronic Voting. 71-83 - Alec Yasinsac:
Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion). 84-93 - Jun Zhao, Virgil D. Gligor, Adrian Perrig, James Newsome:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. 94-114 - Virgil D. Gligor:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). 115-122 - Peter Y. A. Ryan, Bruce Christianson:
Enhancements to Prepare-and-Measure Based QKD Protocols. 123-133 - Peter Y. A. Ryan:
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). 134-142 - Rushil Khurana, Shishir Nagaraja:
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks. 143-151 - Shishir Nagaraja:
Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion). 152-160 - Francesco Bergadano:
Communication Setup in Anonymous Messaging. 161-169 - Francesco Bergadano:
Communication Setup in Anonymous Messaging (Transcript of Discussion). 170-175 - Rubin Xu, Dongting Yu:
Towards a Stronger Location Integrity. 176-179 - Rubin Xu:
Towards a Stronger Location Integrity (Transcript of Discussion). 180-188 - Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford:
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. 189-195 - Mohammed H. Almeshekah:
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion). 196-201 - Ariel Stulman, Jonathan Lahav, Avraham Shmueli:
Spraying Diffie-Hellman for Secure Key Exchange in MANETs. 202-212 - Ariel Stulman:
Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion). 213-222 - Petr Svenda, Václav Matyás:
On the Origin of Yet another Channel. 223-237 - Petr Svenda:
On the Origin of Yet another Channel (Transcript of Discussion). 238-244 - Feng Hao, Dylan Clarke, Carlton Shepherd:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. 245-254 - Feng Hao:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). 255-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.