


default search action
23. Security Protocols Workshop 2015: Cambridge, UK
- Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson

:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 - Olgierd Pieczul, Simon N. Foley

:
The Dark Side of the Code. 1-11 - Simon N. Foley

, Olgierd Pieczul:
The Dark Side of the Code (Transcript of Discussion). 12-21 - Keith Irwin:

Redesigning Secure Protocols to Compel Security Checks. 22-29 - Keith Irwin:

Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion). 30-40 - Sasa Radomirovic

, Mohammad Torabi Dashti
:
Derailing Attacks. 41-46 - Mohammad Torabi Dashti

:
Derailing Attacks (Transcript of Discussion). 47-49 - Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig:

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. 50-68 - Virgil D. Gligor:

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion). 69-79 - Tavish Vaidya, Micah Sherr:

Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones. 80-90 - Tavish Vaidya, Micah Sherr:

Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion). 91-104 - Hugo Jonker

, Sjouke Mauw, Sasa Radomirovic
:
Location-Private Interstellar Communication. 105-115 - Sjouke Mauw

:
Location-Private Interstellar Communication (Transcript of Discussion). 116-125 - Daniel R. Thomas

, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor:
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface. 126-138 - Daniel R. Thomas

:
The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion). 139-144 - Vit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas:

Challenges of Fiction in Network Security - Perspective of Virtualized Environments. 145-151 - Radim Ostádal:

Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion). 152-157 - Jiangshan Yu

, Mark Dermot Ryan
:
Device Attacker Models: Fact and Fiction. 158-167 - Mark Ryan

:
Device Attacker Models: Fact and Fiction (Transcript of Discussion). 168-177 - Sandy Clark, Matt Blaze, Jonathan M. Smith:

Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. 178-182 - Sandy Clark:

Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion). 183-194 - Frank Stajano, Bruce Christianson

, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser:
Pico Without Public Keys. 195-211 - Frank Stajano:

Pico Without Public Keys (Transcript of Discussion). 212-223 - Khaled Baqer, Ross J. Anderson:

Do You Believe in Tinker Bell? The Social Externalities of Trust. 224-236 - Khaled Baqer, Ross J. Anderson:

Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion). 237-246 - Giampaolo Bella

, Luca Viganò
:
Security is Beautiful. 247-250 - Luca Viganò

:
Security is Beautiful (Transcript of Discussion). 251-260 - Joan Feigenbaum, Brad Rosen:

On the Use of Security and Privacy Technology as a Plot Device. 261-275 - Joan Feigenbaum:

On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion). 276-282 - Syed Taha Ali, Dylan Clarke, Patrick McCorry:

Bitcoin: Perils of an Unregulated Global P2P Currency. 283-293 - Syed Taha Ali:

Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion). 294-306 - Paul Wernick, Bruce Christianson:

Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past". 307-313 - Paul Wernick:

Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion). 314-324 - Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan

:
Information Leakage Due to Revealing Randomly Selected Bits. 325-341 - Arash Atashpendar:

Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion). 342-349 - Changyu Dong:

Efficient Data Intensive Secure Computation: Fictional or Real? 350-360 - Changyu Dong:

Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion). 361-363

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














