default search action
27th Security Protocols Workshop 2019: Cambridge, UK
- Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás:
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12287, Springer 2020, ISBN 978-3-030-57042-2
Designing for Humans
- Alexander Hicks, Steven J. Murdoch:
Transparency Enhancing Technologies to Make Security Protocols Work for Humans. 3-10 - Steven J. Murdoch:
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). 11-19 - Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov:
Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You. 20-40 - Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov:
Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion). 41-47
Understanding Humans
- Sasa Radomirovic:
Shaping Our Mental Model of Security. 51-59 - Sasa Radomirovic:
Shaping Our Mental Model of Security (Transcript of Discussion). 60-68 - Simon N. Foley, Vivien M. Rooney:
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. 69-81 - Simon N. Foley, Vivien M. Rooney:
Social Constructionism in Security Protocols (Transcript of Discussion). 82-88
Fresh Perspectives
- Vasilios Mavroudis:
Bounded Temporal Fairness for FIFO Financial Markets. 91-103 - Vasilios Mavroudis:
Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion). 104-112 - Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith:
Mismorphism: The Heart of the Weird Machine. 113-124 - Prashant Anantharaman:
Mismorphism: The Heart of the Weird Machine (Transcript of Discussion). 125-131
Human Limitations in Security
- Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi:
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? 135-147 - Chan Nam Ngo:
Affordable Security or Big Guy vs Small Guy (Transcript of Discussion). 148-156 - Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith:
Human-Computability Boundaries. 157-166 - Vijay Kothari, Michael C. Millian:
Human-Computability Boundaries (Transcript of Discussion). 167-174
Secure Sharing and Collaboration
- Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
Challenges in Designing a Distributed Cryptographic File System. 177-192 - Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson:
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). 193-199
Is the Future Finally Arriving?
- Laurent Chuat, Sarah Plocher, Adrian Perrig:
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. 203-212 - Laurent Chuat:
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion). 213-222 - Virgil D. Gligor:
A Rest Stop on the Unending Road to Provable Security. 223-232 - Virgil D. Gligor:
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). 233-241
Evidence of Humans Behaving Badly
- Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford:
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. 245-257 - Diana A. Vasile:
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion). 258-263
Warnings
- Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig:
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. 267-280 - Lydia Kraus:
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). 281-288 - Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing. 289-303 - Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov:
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). 304-312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.