


default search action
25th Security Protocols Workshop 2017: Cambridge, UK
- Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás:

Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10476, Springer 2017, ISBN 978-3-319-71074-7 - Joan Feigenbaum, Bryan Ford

:
Multiple Objectives of Lawful-Surveillance Protocols. 1-8 - Joan Feigenbaum:

Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion). 9-17 - Simon N. Foley

:
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System. 18-29 - Simon N. Foley

:
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion). 30-37 - Virgil D. Gligor, Frank Stajano:

Assuring the Safety of Asymmetric Social Protocols. 38-48 - Frank Stajano:

Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion). 49-59 - Paul Wernick, Bruce Christianson

, Joseph Spring
:
Simulating Perceptions of Security. 60-68 - Paul Wernick:

Simulating Perceptions of Security (Transcript of Discussion). 69-75 - Partha Das Chowdhury, Bruce Christianson

:
Self Attestation of Things. 76-84 - Partha Das Chowdhury:

Self Attestation of Things (Transcript of Discussion). 85-92 - Mark Dermot Ryan

:
Making Decryption Accountable. 93-98 - Mark Dermot Ryan

:
Making Decryption Accountable (Transcript of Discussion). 99-108 - Milan Broz

:
Extending Full Disk Encryption for the Future. 109-115 - Milan Broz

:
Extending Full Disk Encryption for the Future (Transcript of Discussion). 116-122 - Thanh Bui

, Tuomas Aura
:
Key Exchange with the Help of a Public Ledger. 123-136 - Thanh Bui

:
Key Exchange with the Help of a Public Ledger (Transcript of Discussion). 137-143 - Ross J. Anderson, Khaled Baqer:

Reconciling Multiple Objectives - Politics or Markets? 144-156 - Ross Anderson:

Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion). 157-170 - Fabio Massacci

, Chan Nam Ngo
, Jing Nie, Daniele Venturi, Julian Williams:
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. 171-179 - Chan Nam Ngo

:
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion). 180-185 - Hugo Jonker

, Sjouke Mauw
:
A Security Perspective on Publication Metrics. 186-200 - Hugo Jonker

:
A Security Perspective on Publication Metrics (Transcript of Discussion). 201-213 - Jonathan Weekes, Shishir Nagaraja:

Controlling Your Neighbour's Bandwidth for Fun and for Profit. 214-223 - Jonathan Weekes:

Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion). 224-231 - Marcus Völp, Francisco Rocha, Jeremie Decouchant

, Jiangshan Yu
, Paulo Jorge Esteves Veríssimo:
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. 232-237 - Marcus Völp:

Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion). 238-246 - Sergiu Costea, Marios O. Choudary, Costin Raiciu:

Security from Disjoint Paths: Is It Possible? 247-253 - Marios O. Choudary:

Security from Disjoint Paths: Is It Possible? (Transcript of Discussion). 254-259 - Dylan Clarke, Syed Taha Ali:

End to End Security is Not Enough. 260-267 - Dylan Clarke:

End to End Security is Not Enough (Transcript of Discussion). 268-277 - A. W. Roscoe, Peter Y. A. Ryan

:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. 278-297 - Peter Y. A. Ryan

:
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). 298-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














