


default search action
SSR 2014: London, UK
- Liqun Chen

, Chris J. Mitchell
:
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Lecture Notes in Computer Science 8893, Springer 2014, ISBN 978-3-319-14053-7
Cryptographic Evaluation
- Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:

Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. 1-25 - Feng Hao

, Siamak Fayyaz Shahandashti
:
The SPEKE Protocol Revisited. 26-38 - Christopher W. Brown, Michael Jenkins:

Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected Web. 39-56
Standards Development
- Phillip H. Griffin:

Standardization Transparency - An Out of Body Experience. 57-68 - Jinwoo Lee, Pil Joong Lee:

Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode. 69-78 - Duncan Garrett, Michael Ward:

Blinded Diffie-Hellman - Preventing Eavesdroppers from Tracking Payments. 79-92
Analysis with Formal Methods
- Joshua D. Guttman

, Moses D. Liskov, Paul D. Rowe:
Security Goals and Evolving Standards. 93-110 - Antonio González-Burgueño, Sonia Santiago

, Santiago Escobar
, Catherine Meadows, José Meseguer:
Analysis of the IBM CCA Security API Protocols in Maude-NPA. 111-130 - Efstathios Stathakidis, Steve A. Schneider

, James Heather:
Robustness Modelling and Verification of a Mix Net Protocol. 131-150
Potential Future Areas of Standardisation
- Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim:

Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping. 151-166 - Mark Manulis, Douglas Stebila

, Nick Denham:
Secure Modular Password Authentication for the Web Using Channel Bindings. 167-189 - Nils Fleischhacker

, Mark Manulis, Amir Azodi:
A Modular Framework for Multi-Factor Authentication and Key Exchange. 190-214
Improving Existing Standards
- Cas Cremers, Marko Horvat:

Improving the ISO/IEC 11770 Standard for Key Management Techniques. 215-235 - Britta Hale

, Colin Boyd:
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. 236-255

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














