default search action
25th Security Protocols Workshop 2017: Cambridge, UK
- Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás:
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10476, Springer 2017, ISBN 978-3-319-71074-7 - Joan Feigenbaum, Bryan Ford:
Multiple Objectives of Lawful-Surveillance Protocols. 1-8 - Joan Feigenbaum:
Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion). 9-17 - Simon N. Foley:
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. 18-29 - Simon N. Foley:
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion). 30-37 - Virgil D. Gligor, Frank Stajano:
Assuring the Safety of Asymmetric Social Protocols. 38-48 - Frank Stajano:
Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). 49-59 - Paul Wernick, Bruce Christianson, Joseph Spring:
Simulating Perceptions of Security. 60-68 - Paul Wernick:
Simulating Perceptions of Security (Transcript of Discussion). 69-75 - Partha Das Chowdhury, Bruce Christianson:
Self Attestation of Things. 76-84 - Partha Das Chowdhury:
Self Attestation of Things (Transcript of Discussion). 85-92 - Mark Dermot Ryan:
Making Decryption Accountable. 93-98 - Mark Dermot Ryan:
Making Decryption Accountable (Transcript of Discussion). 99-108 - Milan Broz:
Extending Full Disk Encryption for the Future. 109-115 - Milan Broz:
Extending Full Disk Encryption for the Future (Transcript of Discussion). 116-122 - Thanh Bui, Tuomas Aura:
Key Exchange with the Help of a Public Ledger. 123-136 - Thanh Bui:
Key Exchange with the Help of a Public Ledger (Transcript of Discussion). 137-143 - Ross J. Anderson, Khaled Baqer:
Reconciling Multiple Objectives - Politics or Markets? 144-156 - Ross Anderson:
Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). 157-170 - Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams:
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. 171-179 - Chan Nam Ngo:
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion). 180-185 - Hugo Jonker, Sjouke Mauw:
A Security Perspective on Publication Metrics. 186-200 - Hugo Jonker:
A Security Perspective on Publication Metrics (Transcript of Discussion). 201-213 - Jonathan Weekes, Shishir Nagaraja:
Controlling Your Neighbour's Bandwidth for Fun and for Profit. 214-223 - Jonathan Weekes:
Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion). 224-231 - Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo:
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. 232-237 - Marcus Völp:
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion). 238-246 - Sergiu Costea, Marios O. Choudary, Costin Raiciu:
Security from Disjoint Paths: Is It Possible? 247-253 - Marios O. Choudary:
Security from Disjoint Paths: Is It Possible? (Transcript of Discussion). 254-259 - Dylan Clarke, Syed Taha Ali:
End to End Security is Not Enough. 260-267 - Dylan Clarke:
End to End Security is Not Enough (Transcript of Discussion). 268-277 - A. W. Roscoe, Peter Y. A. Ryan:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. 278-297 - Peter Y. A. Ryan:
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). 298-305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.