Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2018.bht:"
@inproceedings{DBLP:conf/spw/Anderson18, author = {Ross Anderson}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Making Bitcoin Legal (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {254--265}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_30}, doi = {10.1007/978-3-030-03251-7\_30}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonSA18, author = {Ross Anderson and Ilia Shumailov and Mansoor Ahmed{-}Rengers}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Making Bitcoin Legal}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {243--253}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_29}, doi = {10.1007/978-3-030-03251-7\_29}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtwaterG18, author = {Erinn Atwater and Ian Goldberg}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {289--294}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_33}, doi = {10.1007/978-3-030-03251-7\_33}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AtwaterG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtwaterG18a, author = {Erinn Atwater and Ian Goldberg}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {295--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_34}, doi = {10.1007/978-3-030-03251-7\_34}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AtwaterG18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AzouviHM18, author = {Sarah Azouvi and Alexander Hicks and Steven J. Murdoch}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Incentives in Security Protocols}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {132--141}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_15}, doi = {10.1007/978-3-030-03251-7\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AzouviHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BecerraRRS18, author = {Jos{\'{e}} Becerra and Peter B. R{\o}nne and Peter Y. A. Ryan and Petra Sala}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {HoneyPAKEs}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {63--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_7}, doi = {10.1007/978-3-030-03251-7\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/BecerraRRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dumitras18, author = {Tudor Dumitras}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {163--165}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_18}, doi = {10.1007/978-3-030-03251-7\_18}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Dumitras18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/DumitrasKMS18, author = {Tudor Dumitras and Yigitcan Kaya and Radu Marginean and Octavian Suciu}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine Learning System}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {150--162}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_17}, doi = {10.1007/978-3-030-03251-7\_17}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/DumitrasKMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumW18, author = {Joan Feigenbaum and Daniel J. Weitzner}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {266--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_31}, doi = {10.1007/978-3-030-03251-7\_31}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor18, author = {Virgil D. Gligor}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Requirements for Root of Trust Establishment (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {203--208}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_24}, doi = {10.1007/978-3-030-03251-7\_24}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Gligor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorW18, author = {Virgil D. Gligor and Maverick Woo}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Requirements for Root of Trust Establishment}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {192--202}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_23}, doi = {10.1007/978-3-030-03251-7\_23}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/GligorW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kleppmann18, author = {Martin Kleppmann}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {From Secure Messaging to Secure Collaboration (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {186--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_22}, doi = {10.1007/978-3-030-03251-7\_22}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Kleppmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KleppmannKVB18, author = {Martin Kleppmann and Stephan A. Kollmann and Diana A. Vasile and Alastair R. Beresford}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {From Secure Messaging to Secure Collaboration}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {179--185}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_21}, doi = {10.1007/978-3-030-03251-7\_21}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KleppmannKVB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Krol18, author = {Kat Krol}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Intentionality and Agency in Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {126--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_14}, doi = {10.1007/978-3-030-03251-7\_14}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Krol18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KrolLADS18, author = {Kat Krol and David Llewellyn{-}Jones and Seb Aebischer and Claudio Dettoni and Frank Stajano}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Intentionality and Agency in Security}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {114--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_13}, doi = {10.1007/978-3-030-03251-7\_13}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KrolLADS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Li18, author = {Wanpeng Li}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {42--44}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_4}, doi = {10.1007/978-3-030-03251-7\_4}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Li18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LiMC18, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {24--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_3}, doi = {10.1007/978-3-030-03251-7\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LiMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas18, author = {T. Mark A. Lomas}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {User Authentication for the Internet of Things (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {214--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_26}, doi = {10.1007/978-3-030-03251-7\_26}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Lomas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MartimianoM18, author = {Taciane Martimiano and Jean Everson Martina}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {96--105}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_11}, doi = {10.1007/978-3-030-03251-7\_11}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/MartimianoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Martina18, author = {Jean Everson Martina}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {106--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_12}, doi = {10.1007/978-3-030-03251-7\_12}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Martina18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Massacci18, author = {Fabio Massacci}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {55--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_6}, doi = {10.1007/978-3-030-03251-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Massacci18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciN0W18, author = {Fabio Massacci and Chan Nam Ngo and Daniele Venturi and Julian Williams}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {45--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_5}, doi = {10.1007/978-3-030-03251-7\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/McCorry18, author = {Patrick McCorry}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {234--242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_28}, doi = {10.1007/978-3-030-03251-7\_28}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/McCorry18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/McCorryMA18, author = {Patrick McCorry and Malte M{\"{o}}ser and Syed Taha Ali}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {225--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_27}, doi = {10.1007/978-3-030-03251-7\_27}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/McCorryMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murdoch18, author = {Steven J. Murdoch}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Incentives in Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {142--149}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_16}, doi = {10.1007/978-3-030-03251-7\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murdoch18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nemec18, author = {Lukas Nemec}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {93--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_10}, doi = {10.1007/978-3-030-03251-7\_10}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Nemec18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NemecOMS18, author = {Lukas Nemec and Radim Ost{\'{a}}dal and Vashek Matyas and Petr Svenda}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {84--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_9}, doi = {10.1007/978-3-030-03251-7\_9}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/NemecOMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan18, author = {Peter Y. A. Ryan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {HoneyPAKEs (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {78--83}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_8}, doi = {10.1007/978-3-030-03251-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Rymer18, author = {Graham Rymer}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {15--23}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_2}, doi = {10.1007/978-3-030-03251-7\_2}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Rymer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RymerL18, author = {Graham Rymer and David Llewellyn{-}Jones}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Raven Authentication Service - Attacks and Countermeasures}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {1--14}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_1}, doi = {10.1007/978-3-030-03251-7\_1}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/RymerL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoL18, author = {Frank Stajano and T. Mark A. Lomas}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {User Authentication for the Internet of Things}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {209--213}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_25}, doi = {10.1007/978-3-030-03251-7\_25}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/StajanoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Weitzner18, author = {Daniel J. Weitzner}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {280--288}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_32}, doi = {10.1007/978-3-030-03251-7\_32}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Weitzner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan18, author = {Jeff Yan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {How Does Match-Fixing Inform Computer Game Security?}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {166--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_19}, doi = {10.1007/978-3-030-03251-7\_19}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Yan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan18a, author = {Jeff Yan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {171--178}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_20}, doi = {10.1007/978-3-030-03251-7\_20}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Yan18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2018, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7}, doi = {10.1007/978-3-030-03251-7}, isbn = {978-3-030-03250-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.