Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2015.bht:"
@inproceedings{DBLP:conf/spw/Ali15, author = {Syed Taha Ali}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Bitcoin: Perils of an Unregulated Global {P2P} Currency (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {294--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_30}, doi = {10.1007/978-3-319-26096-9\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ali15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AliCM15, author = {Syed Taha Ali and Dylan Clarke and Patrick McCorry}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Bitcoin: Perils of an Unregulated Global {P2P} Currency}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {283--293}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_29}, doi = {10.1007/978-3-319-26096-9\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AliCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Atashpendar15, author = {Arash Atashpendar}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {342--349}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_34}, doi = {10.1007/978-3-319-26096-9\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Atashpendar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtashpendarRR15, author = {Arash Atashpendar and A. W. Roscoe and Peter Y. A. Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Information Leakage Due to Revealing Randomly Selected Bits}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {325--341}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_33}, doi = {10.1007/978-3-319-26096-9\_33}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AtashpendarRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerA15, author = {Khaled Baqer and Ross J. Anderson}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Do You Believe in Tinker Bell? The Social Externalities of Trust}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {224--236}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_23}, doi = {10.1007/978-3-319-26096-9\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerA15a, author = {Khaled Baqer and Ross J. Anderson}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {237--246}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_24}, doi = {10.1007/978-3-319-26096-9\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerA15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaV15, author = {Giampaolo Bella and Luca Vigan{\`{o}}}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security is Beautiful}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {247--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_25}, doi = {10.1007/978-3-319-26096-9\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BukacOSBM15, author = {Vit Bukac and Radim Ost{\'{a}}dal and Petr Svenda and Tatevik Baghdasaryan and Vashek Matyas}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Challenges of Fiction in Network Security - Perspective of Virtualized Environments}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {145--151}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_15}, doi = {10.1007/978-3-319-26096-9\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BukacOSBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clark15, author = {Sandy Clark}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {183--194}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_20}, doi = {10.1007/978-3-319-26096-9\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clark15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS15, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {178--182}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_19}, doi = {10.1007/978-3-319-26096-9\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dashti15, author = {Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {47--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_6}, doi = {10.1007/978-3-319-26096-9\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dashti15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dong15, author = {Changyu Dong}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Efficient Data Intensive Secure Computation: Fictional or Real?}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {350--360}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_35}, doi = {10.1007/978-3-319-26096-9\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dong15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dong15a, author = {Changyu Dong}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {361--363}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_36}, doi = {10.1007/978-3-319-26096-9\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dong15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum15, author = {Joan Feigenbaum}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {276--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_28}, doi = {10.1007/978-3-319-26096-9\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumR15, author = {Joan Feigenbaum and Brad Rosen}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {On the Use of Security and Privacy Technology as a Plot Device}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {261--275}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_27}, doi = {10.1007/978-3-319-26096-9\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyP15, author = {Simon N. Foley and Olgierd Pieczul}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Dark Side of the Code (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {12--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_2}, doi = {10.1007/978-3-319-26096-9\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FoleyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor15, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {69--79}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_8}, doi = {10.1007/978-3-319-26096-9\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Irwin15, author = {Keith Irwin}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Redesigning Secure Protocols to Compel Security Checks}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {22--29}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_3}, doi = {10.1007/978-3-319-26096-9\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Irwin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Irwin15a, author = {Keith Irwin}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {30--40}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_4}, doi = {10.1007/978-3-319-26096-9\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Irwin15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMR15, author = {Hugo Jonker and Sjouke Mauw and Sasa Radomirovic}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {105--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_11}, doi = {10.1007/978-3-319-26096-9\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LiCGP15, author = {Yanlin Li and Yueqiang Cheng and Virgil D. Gligor and Adrian Perrig}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {50--68}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_7}, doi = {10.1007/978-3-319-26096-9\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LiCGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw15, author = {Sjouke Mauw}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {116--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_12}, doi = {10.1007/978-3-319-26096-9\_12}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ostadal15, author = {Radim Ost{\'{a}}dal}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {152--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_16}, doi = {10.1007/978-3-319-26096-9\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ostadal15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF15, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Dark Side of the Code}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {1--11}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_1}, doi = {10.1007/978-3-319-26096-9\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/PieczulF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RadomirovicD15, author = {Sasa Radomirovic and Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {41--46}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_5}, doi = {10.1007/978-3-319-26096-9\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan15, author = {Mark Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Device Attacker Models: Fact and Fiction (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {168--177}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_18}, doi = {10.1007/978-3-319-26096-9\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano15, author = {Frank Stajano}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Pico Without Public Keys (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {212--223}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_22}, doi = {10.1007/978-3-319-26096-9\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoCLJPSS15, author = {Frank Stajano and Bruce Christianson and T. Mark A. Lomas and Graeme Jenkinson and Jeunese A. Payne and Max Spencer and Quentin Stafford{-}Fraser}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Pico Without Public Keys}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {195--211}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_21}, doi = {10.1007/978-3-319-26096-9\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StajanoCLJPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Thomas15, author = {Daniel R. Thomas}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Lifetime of Android {API} Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {139--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_14}, doi = {10.1007/978-3-319-26096-9\_14}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Thomas15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ThomasBCST15, author = {Daniel R. Thomas and Alastair R. Beresford and Thomas Coudray and Tom Sutcliffe and Adrian Taylor}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Lifetime of Android {API} Vulnerabilities: Case Study on the JavaScript-to-Java Interface}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {126--138}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_13}, doi = {10.1007/978-3-319-26096-9\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ThomasBCST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VaidyaS15, author = {Tavish Vaidya and Micah Sherr}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Mind Your (R, {\textbackslash}varPhi {)} s: Location-Based Privacy Controls for Consumer Drones}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {80--90}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_9}, doi = {10.1007/978-3-319-26096-9\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VaidyaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VaidyaS15a, author = {Tavish Vaidya and Micah Sherr}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Mind Your (R, {\textbackslash}varPhi {)} s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {91--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_10}, doi = {10.1007/978-3-319-26096-9\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VaidyaS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Vigano15, author = {Luca Vigan{\`{o}}}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security is Beautiful (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {251--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_26}, doi = {10.1007/978-3-319-26096-9\_26}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Vigano15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wernick15, author = {Paul Wernick}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {314--324}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_32}, doi = {10.1007/978-3-319-26096-9\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wernick15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WernickC15, author = {Paul Wernick and Bruce Christianson}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past"}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {307--313}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_31}, doi = {10.1007/978-3-319-26096-9\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WernickC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuR15, author = {Jiangshan Yu and Mark Dermot Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Device Attacker Models: Fact and Fiction}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {158--167}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_17}, doi = {10.1007/978-3-319-26096-9\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/YuR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2015, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9}, doi = {10.1007/978-3-319-26096-9}, isbn = {978-3-319-26095-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.