Stop the war!
Остановите войну!
for scientists:
default search action
19. Security Protocols Workshop 2011: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano:
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7114, Springer 2011, ISBN 978-3-642-25866-4 - Bruce Christianson:
Introduction: Alice Doesn't Live Here Anymore (Transcript). 1-3 - Mike Burmester:
His Late Master's Voice: Barking for Location Privacy. 4-14 - Mike Burmester:
His Late Master's Voice (Transcript of Discussion). 15-24 - Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? 25-32 - Ross J. Anderson:
Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion). 33-48 - Frank Stajano:
Pico: No More Passwords! 49-81 - Frank Stajano:
Pico: No More Passwords! (Transcript of Discussion). 82-97 - Joseph Bonneau:
Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords. 98-104 - Joseph Bonneau:
Getting Web Authentication Right (Transcript of Discussion). 105-114 - Bangdao Chen, Long Hoang Nguyen, Andrew William Roscoe:
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels. 115-125 - Bangdao Chen:
When Context Is Better Than Identity (Transcript of Discussion). 126-131 - Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Selective Location Blinding Using Hash Chains. 132-141 - Sjouke Mauw:
Selective Location Blinding Using Hash Chains (Transcript of Discussion). 142-149 - Alf Zugenmaier:
Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces. 150-155 - Alf Zugenmaier:
Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion). 156-169 - Feng Hao, Peter Y. A. Ryan:
How to Sync with Alice. 170-178 - Feng Hao:
How to Sync with Alice (Transcript of Discussion). 179-188 - Jirí Kur, Vashek Matyas, Andriy Stetsko, Petr Svenda:
Attack Detection vs. Privacy - How to Find the Link or How to Hide It? 189-199 - Jirí Kur, Andriy Stetsko:
Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion). 200-204 - Yuko Murayama, Yasuhiro Fujihara, Dai Nishioka:
The Sense of Security and a Countermeasure for the False Sense. 205-214 - James Malcolm:
The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion). 215-222 - Virgil D. Gligor, Jeannette M. Wing:
Towards a Theory of Trust in Networks of Humans and Computers. 223-242 - Virgil D. Gligor:
Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion). 243-257 - Alexander V. Shafarenko, Bruce Christianson:
Gearing Up: How to Eat Your Cryptocake and Still Have It. 258-259 - Alex Shafarenko:
Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion). 260-270 - Omar Choudary, Frank Stajano:
Make Noise and Whisper: A Solution to Relay Attacks. 271-283 - Omar Choudary:
Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion). 284-295 - Joseph Bonneau, Rubin Xu:
Scrambling for Lightweight Censorship Resistance. 296-302 - Rubin Xu:
Scrambling for Lightweight Censorship Resistance (Transcript of Discussion). 303-312 - Michael Roe:
The Metaplace Security Model. 313-326 - Michael Roe:
The Metaplace Security Model (Transcript of Discussion). 327-335 - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze:
One-Way Cryptography. 336-340 - Matt Blaze:
One-Way Cryptography (Transcript of Discussion). 341-358 - Jonathan Anderson, Frank Stajano, Robert N. M. Watson:
How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort). 359-367 - Jonathan Anderson:
How to Keep Bad Papers Out of Conferences (Transcript of Discussion). 368-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.