Search dblp for Publications

export results for "stream:streams/conf/spw:"

 download as .bib file

@inproceedings{DBLP:conf/spw/AndersonB23,
  author       = {Ross J. Anderson and
                  Nicholas Boucher},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {If It's Provably Secure, It Probably Isn't: Why Learning from Proof
                  Failure Is Hard},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {199--204},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_19},
  doi          = {10.1007/978-3-031-43033-6\_19},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonB23a,
  author       = {Ross J. Anderson and
                  Nicholas Boucher},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {If It's Provably Secure, It Probably Isn't: Why Learning from Proof
                  Failure is Hard (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {205--210},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_20},
  doi          = {10.1007/978-3-031-43033-6\_20},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonB23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blessing23,
  author       = {Jenny Blessing},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {One Protocol to Rule Them All? On Securing Interoperable Messaging
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {193--198},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_18},
  doi          = {10.1007/978-3-031-43033-6\_18},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blessing23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlessingA23,
  author       = {Jenny Blessing and
                  Ross Anderson},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {One Protocol to Rule Them All? On Securing Interoperable Messaging},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {174--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_17},
  doi          = {10.1007/978-3-031-43033-6\_17},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlessingA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlessingCSAGR23,
  author       = {Jenny Blessing and
                  Partha Das Chowdhury and
                  Maria Sameen and
                  Ross J. Anderson and
                  Joseph Gardiner and
                  Awais Rashid},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Towards Human-Centric Endpoint Security},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {211--219},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_21},
  doi          = {10.1007/978-3-031-43033-6\_21},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlessingCSAGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BozorgiA23,
  author       = {Arastoo Bozorgi and
                  Jonathan Anderson},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Blind Auditing and Probabilistic Access Controls},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {257--269},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_25},
  doi          = {10.1007/978-3-031-43033-6\_25},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BozorgiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chowdhury23,
  author       = {Partha Das Chowdhury},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Towards Human-Centric Endpoint Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {220--227},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_22},
  doi          = {10.1007/978-3-031-43033-6\_22},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Chowdhury23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonS23,
  author       = {Bruce Christianson and
                  Alex Shafarenko},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Transporting a Secret Using Destructively-Read Memory},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {32--37},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_3},
  doi          = {10.1007/978-3-031-43033-6\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorPB23,
  author       = {Virgil D. Gligor and
                  Adrian Perrig and
                  David A. Basin},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Determining an Economic Value of High Assurance for Commodity Software
                  Security},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_23},
  doi          = {10.1007/978-3-031-43033-6\_23},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gloor23,
  author       = {Christelle Gloor},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Trusted Introductions for Secure Messaging (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {136--148},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_14},
  doi          = {10.1007/978-3-031-43033-6\_14},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gloor23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GloorP23,
  author       = {Christelle Gloor and
                  Adrian Perrig},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Trusted Introductions for Secure Messaging},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {123--135},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_13},
  doi          = {10.1007/978-3-031-43033-6\_13},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GloorP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Halpin23,
  author       = {Harry Halpin},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Incentives and Censorship Resistance for Mixnets Revisited (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {70--77},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_8},
  doi          = {10.1007/978-3-031-43033-6\_8},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Halpin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HalpinS23,
  author       = {Harry Halpin and
                  Andrei Serjantov},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Incentives and Censorship Resistance for Mixnets Revisited},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {64--69},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_7},
  doi          = {10.1007/978-3-031-43033-6\_7},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HalpinS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hugenroth23,
  author       = {Daniel Hugenroth},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {162--173},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_16},
  doi          = {10.1007/978-3-031-43033-6\_16},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hugenroth23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HugenrothKB23,
  author       = {Daniel Hugenroth and
                  Ceren Kocaogullar and
                  Alastair R. Beresford},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Choosing Your Friends: Shaping Ethical Use of Anonymity Networks},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {151--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_15},
  doi          = {10.1007/978-3-031-43033-6\_15},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HugenrothKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kruzikova23,
  author       = {Agata Kruzikova},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Authentication of {IT} Professionals in the Wild - {A} Survey (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {57--63},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_6},
  doi          = {10.1007/978-3-031-43033-6\_6},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kruzikova23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KruzikovaMB23,
  author       = {Agata Kruzikova and
                  Vashek Matyas and
                  Milan Broz},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Authentication of {IT} Professionals in the Wild - {A} Survey},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_5},
  doi          = {10.1007/978-3-031-43033-6\_5},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KruzikovaMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Monteith23,
  author       = {Jessica Monteith},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Who Is Benefiting from Your Fitness Data? {A} Privacy Analysis of
                  Smartwatches (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {113--122},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_12},
  doi          = {10.1007/978-3-031-43033-6\_12},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Monteith23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MonteithSTD23,
  author       = {Jessica Monteith and
                  Oliver Shapcott and
                  Anna Talas and
                  Pranav Dahiya},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Who Is Benefiting from Your Fitness Data? {A} Privacy Analysis of
                  Smartwatches},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_11},
  doi          = {10.1007/978-3-031-43033-6\_11},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/MonteithSTD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Perrig23,
  author       = {Adrian Perrig},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Determining an Economic Value of High Assurance for Commodity Software
                  Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_24},
  doi          = {10.1007/978-3-031-43033-6\_24},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Perrig23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Shafarenko23,
  author       = {Alex Shafarenko},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Transporting a Secret Using Destructively-Read Memory (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {38--42},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_4},
  doi          = {10.1007/978-3-031-43033-6\_4},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Shafarenko23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano23,
  author       = {Frank Stajano},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Sleepwalking into Disaster? Requirements Engineering for Digital Cash
                  (Position Paper)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_1},
  doi          = {10.1007/978-3-031-43033-6\_1},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano23a,
  author       = {Frank Stajano},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Sleepwalking into Disaster? Requirements Engineering for Digital Cash
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {20--31},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_2},
  doi          = {10.1007/978-3-031-43033-6\_2},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Turk23,
  author       = {Kieron Ivy Turk},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal
                  Item Tracking Devices (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_10},
  doi          = {10.1007/978-3-031-43033-6\_10},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Turk23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/TurkHB23,
  author       = {Kieron Ivy Turk and
                  Alice Hutchings and
                  Alastair R. Beresford},
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal
                  Item Tracking Devices},
  booktitle    = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  pages        = {78--88},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6\_9},
  doi          = {10.1007/978-3-031-43033-6\_9},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/TurkHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2023,
  editor       = {Frank Stajano and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge,
                  UK, March 27-28, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14186},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43033-6},
  doi          = {10.1007/978-3-031-43033-6},
  isbn         = {978-3-031-43032-9},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2019,
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57043-9},
  doi          = {10.1007/978-3-030-57043-9},
  isbn         = {978-3-030-57042-2},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ahmed-RengersAH19,
  author       = {Mansoor Ahmed{-}Rengers and
                  Ross J. Anderson and
                  Darija Halatova and
                  Ilia Shumailov},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Snitches Get Stitches: On the Difficulty of Whistleblowing},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {289--303},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_27},
  doi          = {10.1007/978-3-030-57043-9\_27},
  timestamp    = {Mon, 24 Aug 2020 16:33:11 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ahmed-RengersAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ahmed-RengersAH19a,
  author       = {Mansoor Ahmed{-}Rengers and
                  Ross J. Anderson and
                  Darija Halatova and
                  Ilia Shumailov},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {304--312},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_28},
  doi          = {10.1007/978-3-030-57043-9\_28},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ahmed-RengersAH19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anantharaman19,
  author       = {Prashant Anantharaman},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Mismorphism: The Heart of the Weird Machine (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {125--131},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_12},
  doi          = {10.1007/978-3-030-57043-9\_12},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anantharaman19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AnantharamanKBJ19,
  author       = {Prashant Anantharaman and
                  Vijay H. Kothari and
                  J. Peter Brady and
                  Ira Ray Jenkins and
                  Sameed Ali and
                  Michael C. Millian and
                  Ross Koppel and
                  Jim Blythe and
                  Sergey Bratus and
                  Sean W. Smith},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Mismorphism: The Heart of the Weird Machine},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {113--124},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_11},
  doi          = {10.1007/978-3-030-57043-9\_11},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AnantharamanKBJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BozorgiJA19,
  author       = {Arastoo Bozorgi and
                  Mahya Soleimani Jadidi and
                  Jonathan Anderson},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Challenges in Designing a Distributed Cryptographic File System},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_17},
  doi          = {10.1007/978-3-030-57043-9\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BozorgiJA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BozorgiJA19a,
  author       = {Arastoo Bozorgi and
                  Mahya Soleimani Jadidi and
                  Jonathan Anderson},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Challenges in Designing a Distributed Cryptographic File System (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {193--199},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_18},
  doi          = {10.1007/978-3-030-57043-9\_18},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BozorgiJA19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chuat19,
  author       = {Laurent Chuat},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_20},
  doi          = {10.1007/978-3-030-57043-9\_20},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Chuat19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChuatPP19,
  author       = {Laurent Chuat and
                  Sarah Plocher and
                  Adrian Perrig},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_19},
  doi          = {10.1007/978-3-030-57043-9\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/ChuatPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyR19,
  author       = {Simon N. Foley and
                  Vivien M. Rooney},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Social Constructionism in Security Protocols - {A} Position on Human
                  Experience, Psychology and Security},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_7},
  doi          = {10.1007/978-3-030-57043-9\_7},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyR19a,
  author       = {Simon N. Foley and
                  Vivien M. Rooney},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Social Constructionism in Security Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {82--88},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_8},
  doi          = {10.1007/978-3-030-57043-9\_8},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyR19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FrioloMN019,
  author       = {Daniele Friolo and
                  Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Affordable Security or Big Guy vs Small Guy - Does the Depth of Your
                  Pockets Impact Your Protocols?},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {135--147},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_13},
  doi          = {10.1007/978-3-030-57043-9\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FrioloMN019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor19,
  author       = {Virgil D. Gligor},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Rest Stop on the Unending Road to Provable Security},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {223--232},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_21},
  doi          = {10.1007/978-3-030-57043-9\_21},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor19a,
  author       = {Virgil D. Gligor},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Rest Stop on the Unending Road to Provable Security (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {233--241},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_22},
  doi          = {10.1007/978-3-030-57043-9\_22},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HicksM19,
  author       = {Alexander Hicks and
                  Steven J. Murdoch},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Transparency Enhancing Technologies to Make Security Protocols Work
                  for Humans},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_1},
  doi          = {10.1007/978-3-030-57043-9\_1},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HicksM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KothariAJMBABBK19,
  author       = {Vijay H. Kothari and
                  Prashant Anantharaman and
                  Ira Ray Jenkins and
                  Michael C. Millian and
                  J. Peter Brady and
                  Sameed Ali and
                  Sergey Bratus and
                  Jim Blythe and
                  Ross Koppel and
                  Sean W. Smith},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Human-Computability Boundaries},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {157--166},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_15},
  doi          = {10.1007/978-3-030-57043-9\_15},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KothariAJMBABBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KothariM19,
  author       = {Vijay Kothari and
                  Michael C. Millian},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Human-Computability Boundaries (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {167--174},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_16},
  doi          = {10.1007/978-3-030-57043-9\_16},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KothariM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kraus19,
  author       = {Lydia Kraus},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Evolution of {SSL/TLS} Indicators and Warnings in Web Browsers (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {281--288},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_26},
  doi          = {10.1007/978-3-030-57043-9\_26},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kraus19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KrausUMF19,
  author       = {Lydia Kraus and
                  Martin Ukrop and
                  Vashek Matyas and
                  Tobias Fiebig},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Evolution of {SSL/TLS} Indicators and Warnings in Web Browsers},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {267--280},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_25},
  doi          = {10.1007/978-3-030-57043-9\_25},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KrausUMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mavroudis19,
  author       = {Vasilios Mavroudis},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Bounded Temporal Fairness for {FIFO} Financial Markets},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {91--103},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_9},
  doi          = {10.1007/978-3-030-57043-9\_9},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mavroudis19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mavroudis19a,
  author       = {Vasilios Mavroudis},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {104--112},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_10},
  doi          = {10.1007/978-3-030-57043-9\_10},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mavroudis19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Murdoch19,
  author       = {Steven J. Murdoch},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Transparency Enhancing Technologies to Make Security Protocols Work
                  for Humans (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {11--19},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_2},
  doi          = {10.1007/978-3-030-57043-9\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Murdoch19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ngo19,
  author       = {Chan Nam Ngo},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Affordable Security or Big Guy vs Small Guy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {148--156},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_14},
  doi          = {10.1007/978-3-030-57043-9\_14},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ngo19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Radomirovic19,
  author       = {Sasa Radomirovic},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Shaping Our Mental Model of Security},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {51--59},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_5},
  doi          = {10.1007/978-3-030-57043-9\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Radomirovic19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Radomirovic19a,
  author       = {Sasa Radomirovic},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Shaping Our Mental Model of Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_6},
  doi          = {10.1007/978-3-030-57043-9\_6},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Radomirovic19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ReinheimerIS19,
  author       = {Benjamin Maximilian Reinheimer and
                  Fairooz Islam and
                  Ilia Shumailov},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Audio {CAPTCHA} with a Few Cocktails: It's so Noisy {I} Can't Hear
                  You},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {20--40},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_3},
  doi          = {10.1007/978-3-030-57043-9\_3},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ReinheimerIS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ReinheimerIS19a,
  author       = {Benjamin Maximilian Reinheimer and
                  Fairooz Islam and
                  Ilia Shumailov},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Audio {CAPTCHA} with a Few Cocktails: It's So Noisy {I} Can't Hear
                  You (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {41--47},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_4},
  doi          = {10.1007/978-3-030-57043-9\_4},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ReinheimerIS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Vasile19,
  author       = {Diana A. Vasile},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Ghost Trace on the Wire? Using Key Evidence for Informed Decisions
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {258--263},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_24},
  doi          = {10.1007/978-3-030-57043-9\_24},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Vasile19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/VasileKTB19,
  author       = {Diana A. Vasile and
                  Martin Kleppmann and
                  Daniel R. Thomas and
                  Alastair R. Beresford},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Ghost Trace on the Wire? Using Key Evidence for Informed Decisions},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {245--257},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_23},
  doi          = {10.1007/978-3-030-57043-9\_23},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/VasileKTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson18,
  author       = {Ross Anderson},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Making Bitcoin Legal (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {254--265},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_30},
  doi          = {10.1007/978-3-030-03251-7\_30},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonSA18,
  author       = {Ross Anderson and
                  Ilia Shumailov and
                  Mansoor Ahmed{-}Rengers},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Making Bitcoin Legal},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {243--253},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_29},
  doi          = {10.1007/978-3-030-03251-7\_29},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AtwaterG18,
  author       = {Erinn Atwater and
                  Ian Goldberg},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted
                  Devices},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {289--294},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_33},
  doi          = {10.1007/978-3-030-03251-7\_33},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AtwaterG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AtwaterG18a,
  author       = {Erinn Atwater and
                  Ian Goldberg},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted
                  Devices (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {295--303},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_34},
  doi          = {10.1007/978-3-030-03251-7\_34},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AtwaterG18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AzouviHM18,
  author       = {Sarah Azouvi and
                  Alexander Hicks and
                  Steven J. Murdoch},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Incentives in Security Protocols},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {132--141},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_15},
  doi          = {10.1007/978-3-030-03251-7\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AzouviHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BecerraRRS18,
  author       = {Jos{\'{e}} Becerra and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Petra Sala},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {HoneyPAKEs},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_7},
  doi          = {10.1007/978-3-030-03251-7\_7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/BecerraRRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dumitras18,
  author       = {Tudor Dumitras},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine
                  Learning System (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {163--165},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_18},
  doi          = {10.1007/978-3-030-03251-7\_18},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Dumitras18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/DumitrasKMS18,
  author       = {Tudor Dumitras and
                  Yigitcan Kaya and
                  Radu Marginean and
                  Octavian Suciu},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine
                  Learning System},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {150--162},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_17},
  doi          = {10.1007/978-3-030-03251-7\_17},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/DumitrasKMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumW18,
  author       = {Joan Feigenbaum and
                  Daniel J. Weitzner},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {On the Incommensurability of Laws and Technical Mechanisms: Or, What
                  Cryptography Can't Do},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {266--279},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_31},
  doi          = {10.1007/978-3-030-03251-7\_31},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FeigenbaumW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor18,
  author       = {Virgil D. Gligor},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Requirements for Root of Trust Establishment (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {203--208},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_24},
  doi          = {10.1007/978-3-030-03251-7\_24},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorW18,
  author       = {Virgil D. Gligor and
                  Maverick Woo},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Requirements for Root of Trust Establishment},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {192--202},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_23},
  doi          = {10.1007/978-3-030-03251-7\_23},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/GligorW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kleppmann18,
  author       = {Martin Kleppmann},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {From Secure Messaging to Secure Collaboration (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {186--191},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_22},
  doi          = {10.1007/978-3-030-03251-7\_22},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Kleppmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KleppmannKVB18,
  author       = {Martin Kleppmann and
                  Stephan A. Kollmann and
                  Diana A. Vasile and
                  Alastair R. Beresford},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {From Secure Messaging to Secure Collaboration},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {179--185},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_21},
  doi          = {10.1007/978-3-030-03251-7\_21},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/KleppmannKVB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Krol18,
  author       = {Kat Krol},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Intentionality and Agency in Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {126--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_14},
  doi          = {10.1007/978-3-030-03251-7\_14},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Krol18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KrolLADS18,
  author       = {Kat Krol and
                  David Llewellyn{-}Jones and
                  Seb Aebischer and
                  Claudio Dettoni and
                  Frank Stajano},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Intentionality and Agency in Security},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {114--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_13},
  doi          = {10.1007/978-3-030-03251-7\_13},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/KrolLADS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Li18,
  author       = {Wanpeng Li},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {42--44},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_4},
  doi          = {10.1007/978-3-030-03251-7\_4},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Li18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LiMC18,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_3},
  doi          = {10.1007/978-3-030-03251-7\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LiMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas18,
  author       = {T. Mark A. Lomas},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {User Authentication for the Internet of Things (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {214--224},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_26},
  doi          = {10.1007/978-3-030-03251-7\_26},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MartimianoM18,
  author       = {Taciane Martimiano and
                  Jean Everson Martina},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save
                  Through Trickery: Human Tailored Threat Models for Formal Verification
                  of Fail-Safe Security Ceremonies},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_11},
  doi          = {10.1007/978-3-030-03251-7\_11},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/MartimianoM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Martina18,
  author       = {Jean Everson Martina},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save
                  Through Trickery: Human Tailored Threat Models for Formal Verification
                  of Fail-Safe Security Ceremonies (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {106--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_12},
  doi          = {10.1007/978-3-030-03251-7\_12},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Martina18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Massacci18,
  author       = {Fabio Massacci},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {55--62},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_6},
  doi          = {10.1007/978-3-030-03251-7\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Massacci18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciN0W18,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi and
                  Julian Williams},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_5},
  doi          = {10.1007/978-3-030-03251-7\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/McCorry18,
  author       = {Patrick McCorry},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {234--242},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_28},
  doi          = {10.1007/978-3-030-03251-7\_28},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/McCorry18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/McCorryMA18,
  author       = {Patrick McCorry and
                  Malte M{\"{o}}ser and
                  Syed Taha Ali},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {225--233},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_27},
  doi          = {10.1007/978-3-030-03251-7\_27},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/McCorryMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Murdoch18,
  author       = {Steven J. Murdoch},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Incentives in Security Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {142--149},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_16},
  doi          = {10.1007/978-3-030-03251-7\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Murdoch18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nemec18,
  author       = {Lukas Nemec},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless
                  Sensor Networks (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {93--95},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_10},
  doi          = {10.1007/978-3-030-03251-7\_10},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Nemec18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NemecOMS18,
  author       = {Lukas Nemec and
                  Radim Ost{\'{a}}dal and
                  Vashek Matyas and
                  Petr Svenda},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless
                  Sensor Networks},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {84--92},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_9},
  doi          = {10.1007/978-3-030-03251-7\_9},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/NemecOMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan18,
  author       = {Peter Y. A. Ryan},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {HoneyPAKEs (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {78--83},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_8},
  doi          = {10.1007/978-3-030-03251-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Rymer18,
  author       = {Graham Rymer},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Raven Authentication Service Attacks and Countermeasures (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {15--23},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_2},
  doi          = {10.1007/978-3-030-03251-7\_2},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Rymer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RymerL18,
  author       = {Graham Rymer and
                  David Llewellyn{-}Jones},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Raven Authentication Service - Attacks and Countermeasures},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_1},
  doi          = {10.1007/978-3-030-03251-7\_1},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/RymerL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StajanoL18,
  author       = {Frank Stajano and
                  T. Mark A. Lomas},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {User Authentication for the Internet of Things},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {209--213},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_25},
  doi          = {10.1007/978-3-030-03251-7\_25},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/StajanoL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Weitzner18,
  author       = {Daniel J. Weitzner},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {On the Incommensurability of Laws and Technical Mechanisms: Or, What
                  Cryptography Can't Do (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {280--288},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_32},
  doi          = {10.1007/978-3-030-03251-7\_32},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Weitzner18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan18,
  author       = {Jeff Yan},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {How Does Match-Fixing Inform Computer Game Security?},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {166--170},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_19},
  doi          = {10.1007/978-3-030-03251-7\_19},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Yan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan18a,
  author       = {Jeff Yan},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {How Does Match-Fixing Inform Computer Game Security? (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {171--178},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_20},
  doi          = {10.1007/978-3-030-03251-7\_20},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Yan18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2018,
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7},
  doi          = {10.1007/978-3-030-03251-7},
  isbn         = {978-3-030-03250-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson17,
  author       = {Ross Anderson},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Reconciling Multiple Objectives - Politics or Markets? (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_18},
  doi          = {10.1007/978-3-319-71075-4\_18},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonB17,
  author       = {Ross J. Anderson and
                  Khaled Baqer},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Reconciling Multiple Objectives - Politics or Markets?},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {144--156},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_17},
  doi          = {10.1007/978-3-319-71075-4\_17},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Broz17,
  author       = {Milan Broz},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Extending Full Disk Encryption for the Future},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {109--115},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_13},
  doi          = {10.1007/978-3-319-71075-4\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Broz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Broz17a,
  author       = {Milan Broz},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Extending Full Disk Encryption for the Future (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {116--122},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_14},
  doi          = {10.1007/978-3-319-71075-4\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Broz17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bui17,
  author       = {Thanh Bui},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Key Exchange with the Help of a Public Ledger (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {137--143},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_16},
  doi          = {10.1007/978-3-319-71075-4\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bui17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BuiA17,
  author       = {Thanh Bui and
                  Tuomas Aura},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Key Exchange with the Help of a Public Ledger},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {123--136},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_15},
  doi          = {10.1007/978-3-319-71075-4\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BuiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Choudary17,
  author       = {Marios O. Choudary},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Security from Disjoint Paths: Is It Possible? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {254--259},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_28},
  doi          = {10.1007/978-3-319-71075-4\_28},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Choudary17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chowdhury17,
  author       = {Partha Das Chowdhury},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Self Attestation of Things (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {85--92},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_10},
  doi          = {10.1007/978-3-319-71075-4\_10},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Chowdhury17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChowdhuryC17,
  author       = {Partha Das Chowdhury and
                  Bruce Christianson},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Self Attestation of Things},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {76--84},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_9},
  doi          = {10.1007/978-3-319-71075-4\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChowdhuryC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clarke17,
  author       = {Dylan Clarke},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {End to End Security is Not Enough (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {268--277},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_30},
  doi          = {10.1007/978-3-319-71075-4\_30},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Clarke17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkeA17,
  author       = {Dylan Clarke and
                  Syed Taha Ali},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {End to End Security is Not Enough},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {260--267},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_29},
  doi          = {10.1007/978-3-319-71075-4\_29},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkeA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CosteaCR17,
  author       = {Sergiu Costea and
                  Marios O. Choudary and
                  Costin Raiciu},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Security from Disjoint Paths: Is It Possible?},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {247--253},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_27},
  doi          = {10.1007/978-3-319-71075-4\_27},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/CosteaCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum17,
  author       = {Joan Feigenbaum},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Multiple Objectives of Lawful-Surveillance Protocols (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {9--17},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_2},
  doi          = {10.1007/978-3-319-71075-4\_2},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Feigenbaum17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumF17,
  author       = {Joan Feigenbaum and
                  Bryan Ford},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Multiple Objectives of Lawful-Surveillance Protocols},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_1},
  doi          = {10.1007/978-3-319-71075-4\_1},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FeigenbaumF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley17,
  author       = {Simon N. Foley},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Getting Security Objectives Wrong: {A} Cautionary Tale of an Industrial
                  Control System},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {18--29},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_3},
  doi          = {10.1007/978-3-319-71075-4\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley17a,
  author       = {Simon N. Foley},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Getting Security Objectives Wrong: {A} Cautionary Tale of an Industrial
                  Control System (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {30--37},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_4},
  doi          = {10.1007/978-3-319-71075-4\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorS17,
  author       = {Virgil D. Gligor and
                  Frank Stajano},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Assuring the Safety of Asymmetric Social Protocols},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_5},
  doi          = {10.1007/978-3-319-71075-4\_5},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/GligorS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jonker17,
  author       = {Hugo Jonker},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Security Perspective on Publication Metrics (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {201--213},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_22},
  doi          = {10.1007/978-3-319-71075-4\_22},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Jonker17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerM17,
  author       = {Hugo Jonker and
                  Sjouke Mauw},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {A Security Perspective on Publication Metrics},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_21},
  doi          = {10.1007/978-3-319-71075-4\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciNNVW17,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Jing Nie and
                  Daniele Venturi and
                  Julian Williams},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {The Seconomics (Security-Economics) Vulnerabilities of Decentralized
                  Autonomous Organizations},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {171--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_19},
  doi          = {10.1007/978-3-319-71075-4\_19},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciNNVW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ngo17,
  author       = {Chan Nam Ngo},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {The Seconomics (Security-Economics) Vulnerabilities of Decentralized
                  Autonomous Organizations (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {180--185},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_20},
  doi          = {10.1007/978-3-319-71075-4\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ngo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RoscoeR17,
  author       = {A. W. Roscoe and
                  Peter Y. A. Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP}},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {278--297},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_31},
  doi          = {10.1007/978-3-319-71075-4\_31},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RoscoeR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan17,
  author       = {Mark Dermot Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Making Decryption Accountable},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {93--98},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_11},
  doi          = {10.1007/978-3-319-71075-4\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan17a,
  author       = {Mark Dermot Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Making Decryption Accountable (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {99--108},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_12},
  doi          = {10.1007/978-3-319-71075-4\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan17b,
  author       = {Peter Y. A. Ryan},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP} (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {298--305},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_32},
  doi          = {10.1007/978-3-319-71075-4\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano17,
  author       = {Frank Stajano},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Assuring the Safety of Asymmetric Social Protocols (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {49--59},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_6},
  doi          = {10.1007/978-3-319-71075-4\_6},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Volp17,
  author       = {Marcus V{\"{o}}lp},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Permanent Reencryption: How to Survive Generations of Cryptanalysts
                  to Come (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {238--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_26},
  doi          = {10.1007/978-3-319-71075-4\_26},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Volp17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/VolpRDYV17,
  author       = {Marcus V{\"{o}}lp and
                  Francisco Rocha and
                  Jeremie Decouchant and
                  Jiangshan Yu and
                  Paulo Jorge Esteves Ver{\'{\i}}ssimo},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Permanent Reencryption: How to Survive Generations of Cryptanalysts
                  to Come},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {232--237},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_25},
  doi          = {10.1007/978-3-319-71075-4\_25},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/VolpRDYV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Weekes17,
  author       = {Jonathan Weekes},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {224--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_24},
  doi          = {10.1007/978-3-319-71075-4\_24},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Weekes17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WeekesN17,
  author       = {Jonathan Weekes and
                  Shishir Nagaraja},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Controlling Your Neighbour's Bandwidth for Fun and for Profit},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {214--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_23},
  doi          = {10.1007/978-3-319-71075-4\_23},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/WeekesN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wernick17,
  author       = {Paul Wernick},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Simulating Perceptions of Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {69--75},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_8},
  doi          = {10.1007/978-3-319-71075-4\_8},
  timestamp    = {Wed, 29 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Wernick17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WernickCS17,
  author       = {Paul Wernick and
                  Bruce Christianson and
                  Joseph Spring},
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Simulating Perceptions of Security},
  booktitle    = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4\_7},
  doi          = {10.1007/978-3-319-71075-4\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WernickCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2016,
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62033-6},
  doi          = {10.1007/978-3-319-62033-6},
  isbn         = {978-3-319-62032-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2017,
  editor       = {Frank Stajano and
                  Jonathan Anderson and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Security Protocols {XXV} - 25th International Workshop, Cambridge,
                  UK, March 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10476},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71075-4},
  doi          = {10.1007/978-3-319-71075-4},
  isbn         = {978-3-319-71074-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaqerA16,
  author       = {Khaled Baqer and
                  Ross J. Anderson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {SMAPs: Short Message Authentication Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {133--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_16},
  doi          = {10.1007/978-3-319-62033-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaqerA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaqerBAK16,
  author       = {Khaled Baqer and
                  S. Johann Bezuidenhoudt and
                  Ross J. Anderson and
                  Markus G. Kuhn},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {SMAPs: Short Message Authentication Protocols},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_15},
  doi          = {10.1007/978-3-319-62033-6\_15},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaqerBAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella16,
  author       = {Giampaolo Bella},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Invisible Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {10--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_2},
  doi          = {10.1007/978-3-319-62033-6\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaC016,
  author       = {Giampaolo Bella and
                  Bruce Christianson and
                  Luca Vigan{\`{o}}},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Invisible Security},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_1},
  doi          = {10.1007/978-3-319-62033-6\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaC016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson16,
  author       = {Bruce Christianson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Price of Belief: Insuring Credible Trust? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {39--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_6},
  doi          = {10.1007/978-3-319-62033-6\_6},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor16,
  author       = {Virgil D. Gligor},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link
                  Flooding Incidents (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {58--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_8},
  doi          = {10.1007/978-3-319-62033-6\_8},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GoldbergJLS16,
  author       = {Ian Goldberg and
                  Graeme Jenkinson and
                  David Llewellyn{-}Jones and
                  Frank Stajano},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Red Button and Yellow Button: Usable Security for Lost Security Tokens},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {165--171},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_19},
  doi          = {10.1007/978-3-319-62033-6\_19},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GoldbergJLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Happe16,
  author       = {Andreas Happe},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Malicious Clients in Distributed Secret Sharing Based Storage Networks
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {215--218},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_24},
  doi          = {10.1007/978-3-319-62033-6\_24},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Happe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HappeKL16,
  author       = {Andreas Happe and
                  Stephan Krenn and
                  Thomas Lor{\"{u}}nser},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Malicious Clients in Distributed Secret Sharing Based Storage Networks},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {206--214},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_23},
  doi          = {10.1007/978-3-319-62033-6\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HappeKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jonker16,
  author       = {Hugo Jonker},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {26--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_4},
  doi          = {10.1007/978-3-319-62033-6\_4},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jonker16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMT16,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {19--25},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_3},
  doi          = {10.1007/978-3-319-62033-6\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KangGS16,
  author       = {Min Suk Kang and
                  Virgil D. Gligor and
                  Vyas Sekar},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link
                  Flooding Incidents},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {47--57},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_7},
  doi          = {10.1007/978-3-319-62033-6\_7},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KangGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kidney16,
  author       = {Brian J. Kidney},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Exploiting Autocorrect to Attack Privacy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {110--118},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_14},
  doi          = {10.1007/978-3-319-62033-6\_14},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kidney16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KidneyA16,
  author       = {Brian J. Kidney and
                  Jonathan Anderson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Exploiting Autocorrect to Attack Privacy},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {103--109},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_13},
  doi          = {10.1007/978-3-319-62033-6\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/KidneyA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16,
  author       = {David Llewellyn{-}Jones and
                  Graeme Jenkinson and
                  Frank Stajano},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Explicit Delegation Using Configurable Cookies},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {141--152},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_17},
  doi          = {10.1007/978-3-319-62033-6\_17},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16a,
  author       = {David Llewellyn{-}Jones},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Explicit Delegation Using Configurable Cookies (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {153--164},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_18},
  doi          = {10.1007/978-3-319-62033-6\_18},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/OstadalSM16,
  author       = {Radim Ost{\'{a}}dal and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Reconsidering Attacker Models in Ad-Hoc Networks},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {219--227},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_25},
  doi          = {10.1007/978-3-319-62033-6\_25},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/OstadalSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PieczulF16,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Evolution of a Security Control},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_9},
  doi          = {10.1007/978-3-319-62033-6\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/PieczulF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PieczulF16a,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Evolution of a Security Control or Why Do We Need More Qualitative
                  Research of Software Vulnerabilties? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {85--89},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_10},
  doi          = {10.1007/978-3-319-62033-6\_10},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PieczulF16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roscoe16,
  author       = {A. W. Roscoe},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Detecting Failed Attacks on Human-Interactive Security Protocols},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_21},
  doi          = {10.1007/978-3-319-62033-6\_21},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roscoe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roscoe16a,
  author       = {A. W. Roscoe},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {198--205},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_22},
  doi          = {10.1007/978-3-319-62033-6\_22},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roscoe16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano16,
  author       = {Frank Stajano},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Red Button and Yellow Button: Usable Security for Lost Security Tokens
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_20},
  doi          = {10.1007/978-3-319-62033-6\_20},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Svenda16,
  author       = {Petr Svenda},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {228--231},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_26},
  doi          = {10.1007/978-3-319-62033-6\_26},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Svenda16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WernickC16,
  author       = {Paul Wernick and
                  Bruce Christianson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Price of Belief: Insuring Credible Trust?},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {35--38},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_5},
  doi          = {10.1007/978-3-319-62033-6\_5},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WernickC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan16,
  author       = {Jeff Yan},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Novel Security and Privacy Perspectives of Camera Fingerprints},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {90--95},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_11},
  doi          = {10.1007/978-3-319-62033-6\_11},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan16a,
  author       = {Jeff Yan},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {96--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_12},
  doi          = {10.1007/978-3-319-62033-6\_12},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ali15,
  author       = {Syed Taha Ali},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Bitcoin: Perils of an Unregulated Global {P2P} Currency (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {294--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_30},
  doi          = {10.1007/978-3-319-26096-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ali15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AliCM15,
  author       = {Syed Taha Ali and
                  Dylan Clarke and
                  Patrick McCorry},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Bitcoin: Perils of an Unregulated Global {P2P} Currency},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {283--293},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_29},
  doi          = {10.1007/978-3-319-26096-9\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AliCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Atashpendar15,
  author       = {Arash Atashpendar},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Information Leakage Due to Revealing Randomly Selected Bits (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {342--349},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_34},
  doi          = {10.1007/978-3-319-26096-9\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Atashpendar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AtashpendarRR15,
  author       = {Arash Atashpendar and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Information Leakage Due to Revealing Randomly Selected Bits},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {325--341},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_33},
  doi          = {10.1007/978-3-319-26096-9\_33},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AtashpendarRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaqerA15,
  author       = {Khaled Baqer and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Do You Believe in Tinker Bell? The Social Externalities of Trust},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {224--236},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_23},
  doi          = {10.1007/978-3-319-26096-9\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaqerA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaqerA15a,
  author       = {Khaled Baqer and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {237--246},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_24},
  doi          = {10.1007/978-3-319-26096-9\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaqerA15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaV15,
  author       = {Giampaolo Bella and
                  Luca Vigan{\`{o}}},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Security is Beautiful},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {247--250},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_25},
  doi          = {10.1007/978-3-319-26096-9\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BukacOSBM15,
  author       = {Vit Bukac and
                  Radim Ost{\'{a}}dal and
                  Petr Svenda and
                  Tatevik Baghdasaryan and
                  Vashek Matyas},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Challenges of Fiction in Network Security - Perspective of Virtualized
                  Environments},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {145--151},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_15},
  doi          = {10.1007/978-3-319-26096-9\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BukacOSBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clark15,
  author       = {Sandy Clark},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Smearing Fingerprints: Changing the Game of Web Tracking and Differential
                  Privacy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_20},
  doi          = {10.1007/978-3-319-26096-9\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Clark15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkBS15,
  author       = {Sandy Clark and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Smearing Fingerprints: Changing the Game of Web Tracking with Composite
                  Privacy},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {178--182},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_19},
  doi          = {10.1007/978-3-319-26096-9\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dashti15,
  author       = {Mohammad Torabi Dashti},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Derailing Attacks (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {47--49},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_6},
  doi          = {10.1007/978-3-319-26096-9\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Dashti15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dong15,
  author       = {Changyu Dong},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Efficient Data Intensive Secure Computation: Fictional or Real?},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {350--360},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_35},
  doi          = {10.1007/978-3-319-26096-9\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Dong15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dong15a,
  author       = {Changyu Dong},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {361--363},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_36},
  doi          = {10.1007/978-3-319-26096-9\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Dong15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum15,
  author       = {Joan Feigenbaum},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Use of Security and Privacy Technology as a Plot Device (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {276--282},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_28},
  doi          = {10.1007/978-3-319-26096-9\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Feigenbaum15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumR15,
  author       = {Joan Feigenbaum and
                  Brad Rosen},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Use of Security and Privacy Technology as a Plot Device},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {261--275},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_27},
  doi          = {10.1007/978-3-319-26096-9\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FeigenbaumR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyP15,
  author       = {Simon N. Foley and
                  Olgierd Pieczul},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Dark Side of the Code (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {12--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_2},
  doi          = {10.1007/978-3-319-26096-9\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor15,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Establishing Software-Only Root of Trust on Embedded Systems: Facts
                  and Fiction (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {69--79},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_8},
  doi          = {10.1007/978-3-319-26096-9\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Irwin15,
  author       = {Keith Irwin},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Redesigning Secure Protocols to Compel Security Checks},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {22--29},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_3},
  doi          = {10.1007/978-3-319-26096-9\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Irwin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Irwin15a,
  author       = {Keith Irwin},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Redesigning Secure Protocols to Compel Security Checks (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {30--40},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_4},
  doi          = {10.1007/978-3-319-26096-9\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Irwin15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMR15,
  author       = {Hugo Jonker and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Location-Private Interstellar Communication},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {105--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_11},
  doi          = {10.1007/978-3-319-26096-9\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LiCGP15,
  author       = {Yanlin Li and
                  Yueqiang Cheng and
                  Virgil D. Gligor and
                  Adrian Perrig},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Establishing Software-Only Root of Trust on Embedded Systems: Facts
                  and Fiction},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {50--68},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_7},
  doi          = {10.1007/978-3-319-26096-9\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LiCGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw15,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Location-Private Interstellar Communication (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {116--125},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_12},
  doi          = {10.1007/978-3-319-26096-9\_12},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ostadal15,
  author       = {Radim Ost{\'{a}}dal},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Challenges of Fiction in Network Security - Perspective of Virtualised
                  Environments (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {152--157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_16},
  doi          = {10.1007/978-3-319-26096-9\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ostadal15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PieczulF15,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Dark Side of the Code},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_1},
  doi          = {10.1007/978-3-319-26096-9\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/PieczulF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RadomirovicD15,
  author       = {Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Derailing Attacks},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {41--46},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_5},
  doi          = {10.1007/978-3-319-26096-9\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan15,
  author       = {Mark Ryan},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Device Attacker Models: Fact and Fiction (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {168--177},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_18},
  doi          = {10.1007/978-3-319-26096-9\_18},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano15,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Pico Without Public Keys (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_22},
  doi          = {10.1007/978-3-319-26096-9\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StajanoCLJPSS15,
  author       = {Frank Stajano and
                  Bruce Christianson and
                  T. Mark A. Lomas and
                  Graeme Jenkinson and
                  Jeunese A. Payne and
                  Max Spencer and
                  Quentin Stafford{-}Fraser},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Pico Without Public Keys},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_21},
  doi          = {10.1007/978-3-319-26096-9\_21},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StajanoCLJPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Thomas15,
  author       = {Daniel R. Thomas},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Lifetime of Android {API} Vulnerabilities: Case Study on the JavaScript-to-Java
                  Interface (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {139--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_14},
  doi          = {10.1007/978-3-319-26096-9\_14},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Thomas15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ThomasBCST15,
  author       = {Daniel R. Thomas and
                  Alastair R. Beresford and
                  Thomas Coudray and
                  Tom Sutcliffe and
                  Adrian Taylor},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Lifetime of Android {API} Vulnerabilities: Case Study on the JavaScript-to-Java
                  Interface},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {126--138},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_13},
  doi          = {10.1007/978-3-319-26096-9\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ThomasBCST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/VaidyaS15,
  author       = {Tavish Vaidya and
                  Micah Sherr},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Mind Your (R, {\textbackslash}varPhi {)} s: Location-Based Privacy
                  Controls for Consumer Drones},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {80--90},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_9},
  doi          = {10.1007/978-3-319-26096-9\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/VaidyaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/VaidyaS15a,
  author       = {Tavish Vaidya and
                  Micah Sherr},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Mind Your (R, {\textbackslash}varPhi {)} s: Location-Based Privacy
                  Controls for Consumer Drones (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_10},
  doi          = {10.1007/978-3-319-26096-9\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/VaidyaS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Vigano15,
  author       = {Luca Vigan{\`{o}}},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Security is Beautiful (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {251--260},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_26},
  doi          = {10.1007/978-3-319-26096-9\_26},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Vigano15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wernick15,
  author       = {Paul Wernick},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Will Technology Make Information Security Impossible? And Must Technology
                  Be Invented Just Because We Can? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {314--324},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_32},
  doi          = {10.1007/978-3-319-26096-9\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wernick15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WernickC15,
  author       = {Paul Wernick and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Will Technology Make Information Security Impossible? And Must Technology
                  Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's
                  "The Productions of Time" and Asimov's "The Dead Past"},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {307--313},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_31},
  doi          = {10.1007/978-3-319-26096-9\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WernickC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YuR15,
  author       = {Jiangshan Yu and
                  Mark Dermot Ryan},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Device Attacker Models: Fact and Fiction},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {158--167},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_17},
  doi          = {10.1007/978-3-319-26096-9\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/YuR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2015,
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9},
  doi          = {10.1007/978-3-319-26096-9},
  isbn         = {978-3-319-26095-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonH14,
  author       = {Ross J. Anderson and
                  Chris Hall},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Collaborating with the Enemy on Network Management (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {163--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_16},
  doi          = {10.1007/978-3-319-12400-1\_16},
  timestamp    = {Mon, 05 Feb 2024 20:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau14,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {FawkesCoin: {A} Cryptocurrency Without Public-Key Cryptography (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {359--370},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_36},
  doi          = {10.1007/978-3-319-12400-1\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BonneauM14,
  author       = {Joseph Bonneau and
                  Andrew Miller},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Fawkescoin - {A} Cryptocurrency Without Public-Key Cryptography},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {350--358},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_35},
  doi          = {10.1007/978-3-319-12400-1\_35},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BonneauM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bukac14,
  author       = {Vit Bukac},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Red Queen's Race: {APT} Win-Win Game (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {62--68},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_8},
  doi          = {10.1007/978-3-319-12400-1\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bukac14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BukacLM14,
  author       = {Vit Bukac and
                  Vaclav Lorenc and
                  Vashek Maty{\'{a}}s},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Red Queen's Race: {APT} Win-Win Game},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {55--61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_7},
  doi          = {10.1007/978-3-319-12400-1\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BukacLM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chowdhury14,
  author       = {Partha Das Chowdhury},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Beyond Trust (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {345--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_34},
  doi          = {10.1007/978-3-319-12400-1\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Chowdhury14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChowdhuryC14,
  author       = {Partha Das Chowdhury and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Beyond Trust},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {340--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_33},
  doi          = {10.1007/978-3-319-12400-1\_33},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChowdhuryC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt14,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic
                  Institutions},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {276--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_27},
  doi          = {10.1007/978-3-319-12400-1\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt14a,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic
                  Institutions (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {286--299},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_28},
  doi          = {10.1007/978-3-319-12400-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumK14,
  author       = {Joan Feigenbaum and
                  J{\'{e}}r{\'{e}}mie Koenig},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Feasibility of a Technological Response to the Surveillance
                  Morass},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {239--252},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_23},
  doi          = {10.1007/978-3-319-12400-1\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FeigenbaumK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumK14a,
  author       = {Joan Feigenbaum and
                  J{\'{e}}r{\'{e}}mie Koenig},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Feasibility of a Technological Response to the Surveillance
                  Morass (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {253--262},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_24},
  doi          = {10.1007/978-3-319-12400-1\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FeigenbaumK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley14,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Collaborating as Normal: Detecting Systemic Anomalies in Your Partner
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {28--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_4},
  doi          = {10.1007/978-3-319-12400-1\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GardinerN14,
  author       = {Joseph Gardiner and
                  Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Reliability of Network Measurement Techniques Used for Malware
                  Traffic Analysis},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {321--333},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_31},
  doi          = {10.1007/978-3-319-12400-1\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GardinerN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Giustolisi14,
  author       = {Rosario Giustolisi},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Remark!: {A} Secure Protocol for Remote Exams (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {49--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_6},
  doi          = {10.1007/978-3-319-12400-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Giustolisi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GiustolisiLR14,
  author       = {Rosario Giustolisi and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Remark!: {A} Secure Protocol for Remote Exams},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_5},
  doi          = {10.1007/978-3-319-12400-1\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GiustolisiLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor14,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Dancing with the Adversary: {A} Tale of Wimps and Giants},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_11},
  doi          = {10.1007/978-3-319-12400-1\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor14a,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Dancing with the Adversary: {A} Tale of Wimps and Giants (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_12},
  doi          = {10.1007/978-3-319-12400-1\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann14,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Why Bother Securing DNS?},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_1},
  doi          = {10.1007/978-3-319-12400-1\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann14a,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Why Bother Securing DNS? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {9--17},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_2},
  doi          = {10.1007/978-3-319-12400-1\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HallYZSOMCBA14,
  author       = {Chris Hall and
                  Dongting Yu and
                  Zhi{-}Li Zhang and
                  Jonathan Stout and
                  Andrew M. Odlyzko and
                  Andrew W. Moore and
                  L. Jean Camp and
                  Kevin Benton and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Collaborating with the Enemy on Network Management},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {154--162},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_15},
  doi          = {10.1007/978-3-319-12400-1\_15},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HallYZSOMCBA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JaggardW14,
  author       = {Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Strange Bedfellows: How and When to Work with Your Enemy},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {263--267},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_25},
  doi          = {10.1007/978-3-319-12400-1\_25},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JaggardW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JenkinsonSWS14,
  author       = {Graeme Jenkinson and
                  Max Spencer and
                  Chris Warrington and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {I Bought a New Security Token and All {I} Got Was This Lousy Phish
                  - Relay Attacks on Visual Code Authentication Schemes},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {197--215},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_19},
  doi          = {10.1007/978-3-319-12400-1\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JenkinsonSWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jurnecka14,
  author       = {Filip Jurnecka},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On Node Capturing Attacker Strategies (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {316--320},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_30},
  doi          = {10.1007/978-3-319-12400-1\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jurnecka14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JurneckaSM14,
  author       = {Filip Jurnecka and
                  Martin Stehl{\'{\i}}k and
                  Vashek Maty{\'{a}}s},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On Node Capturing Attacker Strategies},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {300--315},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_29},
  doi          = {10.1007/978-3-319-12400-1\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JurneckaSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nagaraja14,
  author       = {Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {On the Reliability of Network Measurement Techniques Used for Malware
                  Traffic Analysis (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {334--339},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_32},
  doi          = {10.1007/978-3-319-12400-1\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nagaraja14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PeroliVZ14,
  author       = {Michele Peroli and
                  Luca Vigan{\`{o}} and
                  Matteo Zavatteri},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Non-collaborative Attackers and How and Where to Defend Flawed Security
                  Protocols (Extended Version)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {69--90},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_9},
  doi          = {10.1007/978-3-319-12400-1\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PeroliVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PieczulF14,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Collaborating as Normal: Detecting Systemic Anomalies in Your Partner},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {18--27},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_3},
  doi          = {10.1007/978-3-319-12400-1\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/PieczulF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Spencer14,
  author       = {Max Spencer},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Relay Attacks on Visual Code Authentication Schemes (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {216--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_20},
  doi          = {10.1007/978-3-319-12400-1\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Spencer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano14,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Bootstrapping Adoption of the Pico Password Replacement System (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {187--196},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_18},
  doi          = {10.1007/978-3-319-12400-1\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StajanoJPSSW14,
  author       = {Frank Stajano and
                  Graeme Jenkinson and
                  Jeunese A. Payne and
                  Max Spencer and
                  Quentin Stafford{-}Fraser and
                  Chris Warrington},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Bootstrapping Adoption of the Pico Password Replacement System},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_17},
  doi          = {10.1007/978-3-319-12400-1\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StajanoJPSSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/TanS14,
  author       = {Henry Tan and
                  Micah Sherr},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Censorship Resistance as a Side-Effect},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {221--226},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_21},
  doi          = {10.1007/978-3-319-12400-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/TanS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/TanS14a,
  author       = {Henry Tan and
                  Micah Sherr},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Censorship Resistance as a Side-Effect (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {227--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_22},
  doi          = {10.1007/978-3-319-12400-1\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/TanS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Thomas14,
  author       = {Daniel R. Thomas},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Better Authentication Password Revolution by Evolution (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {146--153},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_14},
  doi          = {10.1007/978-3-319-12400-1\_14},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Thomas14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ThomasB14,
  author       = {Daniel R. Thomas and
                  Alastair R. Beresford},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Better Authentication: Password Revolution by Evolution},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_13},
  doi          = {10.1007/978-3-319-12400-1\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ThomasB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Vigano14,
  author       = {Luca Vigan{\`{o}}},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Non-collaborative Attackers and How and Where to Defend Vulnerable
                  Security Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {91--99},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_10},
  doi          = {10.1007/978-3-319-12400-1\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Vigano14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wright14,
  author       = {Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Strange Bedfellows: How and When to Work with Your Enemy (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {268--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_26},
  doi          = {10.1007/978-3-319-12400-1\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wright14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2010,
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45921-8},
  doi          = {10.1007/978-3-662-45921-8},
  isbn         = {978-3-662-45920-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2014,
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1},
  doi          = {10.1007/978-3-319-12400-1},
  isbn         = {978-3-319-12399-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Almeshekah13,
  author       = {Mohammed H. Almeshekah},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Back Channels Can Be Useful! - Layering Authentication Channels to
                  Provide Covert Communication (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {196--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_23},
  doi          = {10.1007/978-3-642-41717-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Almeshekah13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AlmeshekahAS13,
  author       = {Mohammed H. Almeshekah and
                  Mikhail J. Atallah and
                  Eugene H. Spafford},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Back Channels Can Be Useful! - Layering Authentication Channels to
                  Provide Covert Communication},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {189--195},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_22},
  doi          = {10.1007/978-3-642-41717-7\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AlmeshekahAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BenalohRT13,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Postal Voting},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_8},
  doi          = {10.1007/978-3-642-41717-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BenalohRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bergadano13,
  author       = {Francesco Bergadano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Communication Setup in Anonymous Messaging},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {161--169},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_18},
  doi          = {10.1007/978-3-642-41717-7\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bergadano13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bergadano13a,
  author       = {Francesco Bergadano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Communication Setup in Anonymous Messaging (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {170--175},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_19},
  doi          = {10.1007/978-3-642-41717-7\_19},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bergadano13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson13,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Introduction: What's Happening on the Other Channel? (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_1},
  doi          = {10.1007/978-3-642-41717-7\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor13,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {115--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_13},
  doi          = {10.1007/978-3-642-41717-7\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao13,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {255--264},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_29},
  doi          = {10.1007/978-3-642-41717-7\_29},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoCS13,
  author       = {Feng Hao and
                  Dylan Clarke and
                  Carlton Shepherd},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {245--254},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_28},
  doi          = {10.1007/978-3-642-41717-7\_28},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KhuranaN13,
  author       = {Rushil Khurana and
                  Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {143--151},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_16},
  doi          = {10.1007/978-3-642-41717-7\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KhuranaN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nagaraja13,
  author       = {Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {152--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_17},
  doi          = {10.1007/978-3-642-41717-7\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nagaraja13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan13,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Enhancements to Prepare-and-Measure-Based {QKD} Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {134--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_15},
  doi          = {10.1007/978-3-642-41717-7\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanC13,
  author       = {Peter Y. A. Ryan and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Enhancements to Prepare-and-Measure Based {QKD} Protocols},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {123--133},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_14},
  doi          = {10.1007/978-3-642-41717-7\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stulman13,
  author       = {Ariel Stulman},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_25},
  doi          = {10.1007/978-3-642-41717-7\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stulman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StulmanLS13,
  author       = {Ariel Stulman and
                  Jonathan Lahav and
                  Avraham Shmueli},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {202--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_24},
  doi          = {10.1007/978-3-642-41717-7\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StulmanLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Svenda13,
  author       = {Petr Svenda},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {On the Origin of Yet another Channel (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {238--244},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_27},
  doi          = {10.1007/978-3-642-41717-7\_27},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Svenda13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SvendaM13,
  author       = {Petr Svenda and
                  V{\'{a}}clav Maty{\'{a}}s},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {On the Origin of Yet another Channel},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_26},
  doi          = {10.1007/978-3-642-41717-7\_26},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SvendaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Teague13,
  author       = {Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {End-to-End Verifiable Postal Voting (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {66--70},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_9},
  doi          = {10.1007/978-3-642-41717-7\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Teague13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Watson13,
  author       = {Robert N. M. Watson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Theory of Application Compartmentalisation (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_5},
  doi          = {10.1007/978-3-642-41717-7\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Watson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WatsonMGANL13,
  author       = {Robert N. M. Watson and
                  Steven J. Murdoch and
                  Khilan Gudka and
                  Jonathan Anderson and
                  Peter G. Neumann and
                  Ben Laurie},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Theory of Application Compartmentalisation},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {19--27},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_4},
  doi          = {10.1007/978-3-642-41717-7\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WatsonMGANL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Xu13,
  author       = {Rubin Xu},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Stronger Location Integrity (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {180--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_21},
  doi          = {10.1007/978-3-642-41717-7\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Xu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/XuY13,
  author       = {Rubin Xu and
                  Dongting Yu},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Stronger Location Integrity},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {176--179},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_20},
  doi          = {10.1007/978-3-642-41717-7\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/XuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan13,
  author       = {Jeff Yan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards New Security Primitives Based on Hard {AI} Problems (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {11--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_3},
  doi          = {10.1007/978-3-642-41717-7\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yasinsac13,
  author       = {Alec Yasinsac},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Independent Computations for Safe Remote Electronic Voting},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_10},
  doi          = {10.1007/978-3-642-41717-7\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yasinsac13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yasinsac13a,
  author       = {Alec Yasinsac},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Independent Computations for Safe Remote Electronic Voting (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {84--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_11},
  doi          = {10.1007/978-3-642-41717-7\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yasinsac13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yu13,
  author       = {Dongting Yu},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Authentication for Resilience: The Case of {SDN} (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {45--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_7},
  doi          = {10.1007/978-3-642-41717-7\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YuMHA13,
  author       = {Dongting Yu and
                  Andrew W. Moore and
                  Chris Hall and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Authentication for Resilience: The Case of {SDN}},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {39--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_6},
  doi          = {10.1007/978-3-642-41717-7\_6},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YuMHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ZhaoGPN13,
  author       = {Jun Zhao and
                  Virgil D. Gligor and
                  Adrian Perrig and
                  James Newsome},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {94--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_12},
  doi          = {10.1007/978-3-642-41717-7\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/ZhaoGPN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ZhuY13,
  author       = {Bin B. Zhu and
                  Jeff Yan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards New Security Primitives Based on Hard {AI} Problems},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_2},
  doi          = {10.1007/978-3-642-41717-7\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ZhuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2009,
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36213-2},
  doi          = {10.1007/978-3-642-36213-2},
  isbn         = {978-3-642-36212-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2013,
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7},
  doi          = {10.1007/978-3-642-41717-7},
  isbn         = {978-3-642-41716-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Andel12,
  author       = {Todd R. Andel},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Secure Internet Voting Protocol for Overseas Military Voters (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {15--22},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_3},
  doi          = {10.1007/978-3-642-35694-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Andel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndelY12,
  author       = {Todd R. Andel and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Secure Internet Voting Protocol for Overseas Military Voters},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_2},
  doi          = {10.1007/978-3-642-35694-0\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndelY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson12,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Protocol Governance: The Elite, or the Mob?},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {145},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_16},
  doi          = {10.1007/978-3-642-35694-0\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson12a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Protocol Governance: The Elite, or the Mob? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {146--160},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_17},
  doi          = {10.1007/978-3-642-35694-0\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson12b,
  author       = {Jonathan Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {251--258},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_27},
  doi          = {10.1007/978-3-642-35694-0\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonW12,
  author       = {Jonathan Anderson and
                  Robert N. M. Watson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Stayin' Alive: Aliveness as an Alternative to Authentication},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {242--250},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_26},
  doi          = {10.1007/978-3-642-35694-0\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze12,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Casino and the {OODA} Loop: Why Our Protocols Always Eventually
                  Fail (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {64--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_9},
  doi          = {10.1007/978-3-642-35694-0\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau12,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Statistical Metrics for Individual Password Strength},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {76--86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_10},
  doi          = {10.1007/978-3-642-35694-0\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau12a,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Statistical Metrics for Individual Password Strength (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {87--95},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_11},
  doi          = {10.1007/978-3-642-35694-0\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Brooke12,
  author       = {Phillip J. Brooke},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {55--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_7},
  doi          = {10.1007/978-3-642-35694-0\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Brooke12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BrookePP12,
  author       = {Phillip J. Brooke and
                  Richard F. Paige and
                  Christopher Power},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Approaches to Modelling Security Scenarios with Domain-Specific Languages},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_6},
  doi          = {10.1007/978-3-642-35694-0\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BrookePP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CanlarCCP12,
  author       = {Ey{\"{u}}p S. Canlar and
                  Mauro Conti and
                  Bruno Crispo and
                  Roberto Di Pietro},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking
                  System},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {199--213},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_22},
  doi          = {10.1007/978-3-642-35694-0\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CanlarCCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson12,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Introduction: Bringing Protocols to Life (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_1},
  doi          = {10.1007/978-3-642-35694-0\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkBS12,
  author       = {Sandy Clark and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {The Casino and the {OODA} Loop - Why Our Protocols Always Eventually
                  Fail},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {60--63},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_8},
  doi          = {10.1007/978-3-642-35694-0\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clarke12,
  author       = {Dylan Clarke},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Analysis of Issues and Challenges of E-Voting in the {UK} (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {136--144},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_15},
  doi          = {10.1007/978-3-642-35694-0\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Clarke12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkeHR12,
  author       = {Dylan Clarke and
                  Feng Hao and
                  Brian Randell},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Analysis of Issues and Challenges of E-Voting in the {UK}},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {126--135},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_14},
  doi          = {10.1007/978-3-642-35694-0\_14},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkeHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Conti12,
  author       = {Mauro Conti},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking
                  System (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {214--222},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_23},
  doi          = {10.1007/978-3-642-35694-0\_23},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Conti12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor12,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Street-Level Trust Semantics for Attribute Authentication (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {116--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_13},
  doi          = {10.1007/978-3-642-35694-0\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao12,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Self-enforcing Electronic Voting (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {32--40},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_5},
  doi          = {10.1007/978-3-642-35694-0\_5},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoRC12,
  author       = {Feng Hao and
                  Brian Randell and
                  Dylan Clarke},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Self-enforcing Electronic Voting},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {23--31},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_4},
  doi          = {10.1007/978-3-642-35694-0\_4},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KimGP12,
  author       = {Tiffany Hyun{-}Jin Kim and
                  Virgil D. Gligor and
                  Adrian Perrig},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Street-Level Trust Semantics for Attribute Authentication},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {96--115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_12},
  doi          = {10.1007/978-3-642-35694-0\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KimGP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mahmood12,
  author       = {Shah Mahmood},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Usable Privacy by Visual and Interactive Control of Information Flow
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {189--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_21},
  doi          = {10.1007/978-3-642-35694-0\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mahmood12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MahmoodD12,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Usable Privacy by Visual and Interactive Control of Information Flow},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {181--188},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_20},
  doi          = {10.1007/978-3-642-35694-0\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MahmoodD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Murayama12,
  author       = {Yuko Murayama},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Usability Issues in Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_19},
  doi          = {10.1007/978-3-642-35694-0\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Murayama12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MurayamaFSN12,
  author       = {Yuko Murayama and
                  Yasuhiro Fujihara and
                  Yoshia Saito and
                  Dai Nishioka},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Usability Issues in Security},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {161--171},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_18},
  doi          = {10.1007/978-3-642-35694-0\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MurayamaFSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano12,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Am {I} in Good Company? {A} Privacy-Protecting Protocol for Cooperating
                  Ubiquitous Computing Devices (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {231--241},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_25},
  doi          = {10.1007/978-3-642-35694-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StannardS12,
  author       = {Oliver Stannard and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Am {I} in Good Company? {A} Privacy-Protecting Protocol for Cooperating
                  Ubiquitous Computing Devices},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {223--230},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_24},
  doi          = {10.1007/978-3-642-35694-0\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StannardS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Syverson12,
  author       = {Paul Syverson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Paul Revere Protocols},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {259--266},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_28},
  doi          = {10.1007/978-3-642-35694-0\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Syverson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Syverson12a,
  author       = {Paul Syverson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Paul Revere Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  pages        = {267--275},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0\_29},
  doi          = {10.1007/978-3-642-35694-0\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Syverson12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2012,
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Security Protocols {XX} - 20th International Workshop, Cambridge,
                  UK, April 12-13, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7622},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35694-0},
  doi          = {10.1007/978-3-642-35694-0},
  isbn         = {978-3-642-35693-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson11,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Can We Fix the Security Economics of Federated Authentication?},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {25--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_4},
  doi          = {10.1007/978-3-642-25867-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson11a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Can We Fix the Security Economics of Federated Authentication? (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_5},
  doi          = {10.1007/978-3-642-25867-1\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson11b,
  author       = {Jonathan Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Keep Bad Papers Out of Conferences (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {368--380},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_35},
  doi          = {10.1007/978-3-642-25867-1\_35},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonSW11,
  author       = {Jonathan Anderson and
                  Frank Stajano and
                  Robert N. M. Watson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {359--367},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_34},
  doi          = {10.1007/978-3-642-25867-1\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze11,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {One-Way Cryptography (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {341--358},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_33},
  doi          = {10.1007/978-3-642-25867-1\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau11,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Getting Web Authentication Right {A} Best-Case Protocol for the Remaining
                  Life of Passwords},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {98--104},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_8},
  doi          = {10.1007/978-3-642-25867-1\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau11a,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Getting Web Authentication Right (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {105--114},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_9},
  doi          = {10.1007/978-3-642-25867-1\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BonneauX11,
  author       = {Joseph Bonneau and
                  Rubin Xu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Scrambling for Lightweight Censorship Resistance},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {296--302},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_28},
  doi          = {10.1007/978-3-642-25867-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BonneauX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Burmester11,
  author       = {Mike Burmester},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {His Late Master's Voice: Barking for Location Privacy},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {4--14},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_2},
  doi          = {10.1007/978-3-642-25867-1\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Burmester11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Burmester11a,
  author       = {Mike Burmester},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {His Late Master's Voice (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {15--24},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_3},
  doi          = {10.1007/978-3-642-25867-1\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Burmester11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chen11,
  author       = {Bangdao Chen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {When Context Is Better Than Identity (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {126--131},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_11},
  doi          = {10.1007/978-3-642-25867-1\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenNR11,
  author       = {Bangdao Chen and
                  Long Hoang Nguyen and
                  Andrew William Roscoe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {When Context Is Better Than Identity: Authentication by Context Using
                  Empirical Channels},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {115--125},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_10},
  doi          = {10.1007/978-3-642-25867-1\_10},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChenNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Choudary11,
  author       = {Omar Choudary},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Make Noise and Whisper: {A} Solution to Relay Attacks (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_27},
  doi          = {10.1007/978-3-642-25867-1\_27},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Choudary11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChoudaryS11,
  author       = {Omar Choudary and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Make Noise and Whisper: {A} Solution to Relay Attacks},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {271--283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_26},
  doi          = {10.1007/978-3-642-25867-1\_26},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChoudaryS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson11,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Introduction: Alice Doesn't Live Here Anymore (Transcript)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_1},
  doi          = {10.1007/978-3-642-25867-1\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkGMWXB11,
  author       = {Sandy Clark and
                  Travis Goodspeed and
                  Perry Metzger and
                  Zachary Wasserman and
                  Kevin Xu and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {One-Way Cryptography},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {336--340},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_32},
  doi          = {10.1007/978-3-642-25867-1\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkGMWXB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor11,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Towards a Theory of Trust in Networks of Humans and Computers (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_23},
  doi          = {10.1007/978-3-642-25867-1\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorW11,
  author       = {Virgil D. Gligor and
                  Jeannette M. Wing},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Towards a Theory of Trust in Networks of Humans and Computers},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_22},
  doi          = {10.1007/978-3-642-25867-1\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao11,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Sync with Alice (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_17},
  doi          = {10.1007/978-3-642-25867-1\_17},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoR11,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Sync with Alice},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_16},
  doi          = {10.1007/978-3-642-25867-1\_16},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KurMSS11,
  author       = {Jir{\'{\i}} Kur and
                  Vashek Matyas and
                  Andriy Stetsko and
                  Petr Svenda},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Attack Detection vs. Privacy - How to Find the Link or How to Hide
                  It?},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {189--199},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_18},
  doi          = {10.1007/978-3-642-25867-1\_18},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KurMSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KurS11,
  author       = {Jir{\'{\i}} Kur and
                  Andriy Stetsko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Attack Detection vs Privacy - How to Find the Link or How to Hide
                  It (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {200--204},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_19},
  doi          = {10.1007/978-3-642-25867-1\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KurS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LenziniMP11,
  author       = {Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Selective Location Blinding Using Hash Chains},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {132--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_12},
  doi          = {10.1007/978-3-642-25867-1\_12},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LenziniMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Malcolm11,
  author       = {James Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Sense of Security and a Countermeasure for the False Sense (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {215--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_21},
  doi          = {10.1007/978-3-642-25867-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Malcolm11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw11,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Selective Location Blinding Using Hash Chains (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {142--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_13},
  doi          = {10.1007/978-3-642-25867-1\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MurayamaFN11,
  author       = {Yuko Murayama and
                  Yasuhiro Fujihara and
                  Dai Nishioka},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Sense of Security and a Countermeasure for the False Sense},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {205--214},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_20},
  doi          = {10.1007/978-3-642-25867-1\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MurayamaFN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe11,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Metaplace Security Model},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_30},
  doi          = {10.1007/978-3-642-25867-1\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe11a,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Metaplace Security Model (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {327--335},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_31},
  doi          = {10.1007/978-3-642-25867-1\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Shafarenko11,
  author       = {Alex Shafarenko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {260--270},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_25},
  doi          = {10.1007/978-3-642-25867-1\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Shafarenko11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ShafarenkoC11,
  author       = {Alexander V. Shafarenko and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Gearing Up: How to Eat Your Cryptocake and Still Have It},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {258--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_24},
  doi          = {10.1007/978-3-642-25867-1\_24},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ShafarenkoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano11,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Pico: No More Passwords!},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {49--81},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_6},
  doi          = {10.1007/978-3-642-25867-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano11a,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Pico: No More Passwords! (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_7},
  doi          = {10.1007/978-3-642-25867-1\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Xu11,
  author       = {Rubin Xu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {303--312},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_29},
  doi          = {10.1007/978-3-642-25867-1\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Xu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Zugenmaier11,
  author       = {Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Risks of Blind Controllers and Deaf Views in Model View Controller
                  Patterns for Multitag User Interfaces},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {150--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_14},
  doi          = {10.1007/978-3-642-25867-1\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Zugenmaier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Zugenmaier11a,
  author       = {Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {156--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_15},
  doi          = {10.1007/978-3-642-25867-1\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Zugenmaier11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2008,
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22137-8},
  doi          = {10.1007/978-3-642-22137-8},
  isbn         = {978-3-642-22136-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2011,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1},
  doi          = {10.1007/978-3-642-25867-1},
  isbn         = {978-3-642-25866-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Aloteibi10,
  author       = {Saad Aloteibi},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {On the Value of Hybrid Security Testing (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {214--216},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_31},
  doi          = {10.1007/978-3-662-45921-8\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Aloteibi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AloteibiS10,
  author       = {Saad Aloteibi and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {On the Value of Hybrid Security Testing},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {207--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_30},
  doi          = {10.1007/978-3-662-45921-8\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AloteibiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson10,
  author       = {Jonathan Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {On Storing Private Keys in the Cloud (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {107--114},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_17},
  doi          = {10.1007/978-3-662-45921-8\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson10a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {It's the Anthropology, Stupid! (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {131--141},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_21},
  doi          = {10.1007/978-3-662-45921-8\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonS10,
  author       = {Jonathan Anderson and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {On Storing Private Keys in the Cloud},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {98--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_16},
  doi          = {10.1007/978-3-662-45921-8\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonS10a,
  author       = {Ross J. Anderson and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {It's the Anthropology, Stupid!},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {127--130},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_20},
  doi          = {10.1007/978-3-662-45921-8\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaRT10,
  author       = {Giampaolo Bella and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Virtually Perfect Democracy},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {161--166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_24},
  doi          = {10.1007/978-3-662-45921-8\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau10,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Digital Immolation - New Directions for Online Protest},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {25--33},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_6},
  doi          = {10.1007/978-3-662-45921-8\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau10a,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Digital Immolation (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {34--44},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_7},
  doi          = {10.1007/978-3-662-45921-8\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChowdhuryC10,
  author       = {Partha Das Chowdhury and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {More Security or Less Insecurity},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {115--119},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_18},
  doi          = {10.1007/978-3-662-45921-8\_18},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChowdhuryC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson10,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Introduction: Virtually Perfect Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_1},
  doi          = {10.1007/978-3-662-45921-8\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson10a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {More Security or Less Insecurity (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {120--126},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_19},
  doi          = {10.1007/978-3-662-45921-8\_19},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson10b,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Recapitulation},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {266},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_36},
  doi          = {10.1007/978-3-662-45921-8\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonSSW10,
  author       = {Bruce Christianson and
                  Alex Shafarenko and
                  Frank Stajano and
                  Ford{-}Long Wong},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Relay-Proof Channels Using {UWB} Lasers},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {45--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_8},
  doi          = {10.1007/978-3-662-45921-8\_8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonSSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clark10,
  author       = {Sandy Clark},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Blood in the Water (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {18--24},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_5},
  doi          = {10.1007/978-3-662-45921-8\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Clark10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkBS10,
  author       = {Sandy Clark and
                  Matt Blaze and
                  Jonathan M. Smith},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Blood in the Water - Are there Honeymoon Effects Outside Software?},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {12--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_4},
  doi          = {10.1007/978-3-662-45921-8\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Conti10,
  author       = {Mauro Conti},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Censorship-Resilient Communications through Information Scattering
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {90--97},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_15},
  doi          = {10.1007/978-3-662-45921-8\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Conti10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis10,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Generating Channel Ids in Virtual World Operating Systems (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {74--81},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_13},
  doi          = {10.1007/978-3-662-45921-8\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor10,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Limitations of Virtualization and How to Overcome Them},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {233--251},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_34},
  doi          = {10.1007/978-3-662-45921-8\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor10a,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Limitations of Virtualization and How to Overcome Them (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {252--265},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_35},
  doi          = {10.1007/978-3-662-45921-8\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann10,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Caught in the Maze of Security Standards (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {4--11},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_3},
  doi          = {10.1007/978-3-662-45921-8\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw10,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols for Secret Santa (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {185--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_27},
  doi          = {10.1007/978-3-662-45921-8\_27},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MauwRR10,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Protocols for Secret Santa},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {175--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_26},
  doi          = {10.1007/978-3-662-45921-8\_26},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MauwRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MeierG10,
  author       = {Jan Meier and
                  Dieter Gollmann},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Caught in the Maze of Security Standards},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {3},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_2},
  doi          = {10.1007/978-3-662-45921-8\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MeierG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MortierMHMS10,
  author       = {Richard Mortier and
                  Anil Madhavapeddy and
                  Theodore Hong and
                  Derek Gordon Murray and
                  Malte Schwarzkopf},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Using Dust Clouds to Enhance Anonymous Communication},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {54--59},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_10},
  doi          = {10.1007/978-3-662-45921-8\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MortierMHMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/OrtolaniCC10,
  author       = {Stefano Ortolani and
                  Mauro Conti and
                  Bruno Crispo},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Censorship-Resilient Communications through Information Scattering},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {82--89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_14},
  doi          = {10.1007/978-3-662-45921-8\_14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/OrtolaniCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe10,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Generating Channel Ids in Virtual World Operating Systems (Extended
                  Abstract)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {71--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_12},
  doi          = {10.1007/978-3-662-45921-8\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe10a,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Censorship of eBooks (Extended Abstract)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {191--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_28},
  doi          = {10.1007/978-3-662-45921-8\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe10b,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Censorship of eBooks (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {200--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_29},
  doi          = {10.1007/978-3-662-45921-8\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan10,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Virtually Perfect Democracy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {167--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_25},
  doi          = {10.1007/978-3-662-45921-8\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Schwarzkopf10,
  author       = {Malte Schwarzkopf},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Using Dust Clouds to Enhance Anonymous Communication (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {60--70},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_11},
  doi          = {10.1007/978-3-662-45921-8\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Schwarzkopf10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Shafarenko10,
  author       = {Alex Shafarenko},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Relay-Proof Channels Using {UWB} Lasers (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {47--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_9},
  doi          = {10.1007/978-3-662-45921-8\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Shafarenko10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Verissimo10,
  author       = {Paulo Ver{\'{\i}}ssimo},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Made, Not Perfect, But Automatic},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {217--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_32},
  doi          = {10.1007/978-3-662-45921-8\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Verissimo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Verissimo10a,
  author       = {Paulo Ver{\'{\i}}ssimo},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Made, Not Perfect, But Automatic (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {224--232},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_33},
  doi          = {10.1007/978-3-662-45921-8\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Verissimo10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan10,
  author       = {Jeff Yan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Design in Human Computation Games (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {154--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_23},
  doi          = {10.1007/978-3-662-45921-8\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YuY10,
  author       = {Su{-}Yang Yu and
                  Jeff Yan},
  editor       = {Bruce Christianson and
                  James A. Malcolm},
  title        = {Security Design in Human Computation Games},
  booktitle    = {Security Protocols {XVIII} - 18th International Workshop, Cambridge,
                  UK, March 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7061},
  pages        = {142--153},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-662-45921-8\_22},
  doi          = {10.1007/978-3-662-45921-8\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YuY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2007,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17773-6},
  doi          = {10.1007/978-3-642-17773-6},
  isbn         = {978-3-642-17772-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson09,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Trust Economy of Brief Encounters},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {282--284},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_31},
  doi          = {10.1007/978-3-642-36213-2\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson09a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Trust Economy of Brief Encounters},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_32},
  doi          = {10.1007/978-3-642-36213-2\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson09b,
  author       = {Jonathan Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Not That Kind of Friend},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_38},
  doi          = {10.1007/978-3-642-36213-2\_38},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonS09,
  author       = {Jonathan Anderson and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Not That Kind of Friend},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {343--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_37},
  doi          = {10.1007/978-3-642-36213-2\_37},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArsacBCC09,
  author       = {Wihem Arsac and
                  Giampaolo Bella and
                  Xavier Chantry and
                  Luca Compagna},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Attacking Each Other},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {41--47},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_7},
  doi          = {10.1007/978-3-642-36213-2\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArsacBCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Backes09,
  author       = {Michael Backes},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Design and Verification of Anonymous Trust Protocols},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {149--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_18},
  doi          = {10.1007/978-3-642-36213-2\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Backes09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BackesM09,
  author       = {Michael Backes and
                  Matteo Maffei},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Design and Verification of Anonymous Trust Protocols},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {143--148},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_17},
  doi          = {10.1007/978-3-642-36213-2\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BackesM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BangerterBKS0T09,
  author       = {Endre Bangerter and
                  Stefania Barzan and
                  Stephan Krenn and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Joe{-}Kai Tsay},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Bringing Zero-Knowledge Proofs of Knowledge to Practice},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {51--62},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_9},
  doi          = {10.1007/978-3-642-36213-2\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/BangerterBKS0T09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze09,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Is the Honeymoon over?},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {28--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_5},
  doi          = {10.1007/978-3-642-36213-2\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze09a,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Below the Salt},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {34--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_6},
  doi          = {10.1007/978-3-642-36213-2\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeM09,
  author       = {Matt Blaze and
                  Patrick D. McDaniel},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Below the Salt},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {24--27},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_4},
  doi          = {10.1007/978-3-642-36213-2\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau09,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Alice and Bob in Love},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {189--198},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_23},
  doi          = {10.1007/978-3-642-36213-2\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau09a,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Alice and Bob in Love},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_24},
  doi          = {10.1007/978-3-642-36213-2\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Card09,
  author       = {Orson Scott Card},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Final Word},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {365},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_39},
  doi          = {10.1007/978-3-642-36213-2\_39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Card09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chantry09,
  author       = {Xavier Chantry},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Attacking Each Other},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {48--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_8},
  doi          = {10.1007/978-3-642-36213-2\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Chantry09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson09,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Introduction: Brief Encounters},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_1},
  doi          = {10.1007/978-3-642-36213-2\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson09a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Trust*: Using Local Guarantees to Extend the Reach of Trust},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_22},
  doi          = {10.1007/978-3-642-36213-2\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkeCX09,
  author       = {Stephen William Clarke and
                  Bruce Christianson and
                  Hannan Xiao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Trust*: Using Local Guarantees to Extend the Reach of Trust},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {171--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_21},
  doi          = {10.1007/978-3-642-36213-2\_21},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkeCX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis09,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {87--92},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_13},
  doi          = {10.1007/978-3-642-36213-2\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis09a,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_14},
  doi          = {10.1007/978-3-642-36213-2\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley09,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Qualitative Analysis for Trust Management},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {308--320},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_34},
  doi          = {10.1007/978-3-642-36213-2\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Foley09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyR09,
  author       = {Simon N. Foley and
                  Vivien M. Rooney},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Qualitative Analysis for Trust Management},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {298--307},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_33},
  doi          = {10.1007/978-3-642-36213-2\_33},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor09,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Brief Encounters with a Random Key Graph},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {162--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_20},
  doi          = {10.1007/978-3-642-36213-2\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorPZ09,
  author       = {Virgil D. Gligor and
                  Adrian Perrig and
                  Jun Zhao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Brief Encounters with a Random Key Graph},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {157--161},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_19},
  doi          = {10.1007/978-3-642-36213-2\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Krenn09,
  author       = {Stephan Krenn},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Bringing Zero-Knowledge Proofs of Knowledge to Practice},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {63--68},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_10},
  doi          = {10.1007/978-3-642-36213-2\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Krenn09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KurMS09,
  author       = {Jir{\'{\i}} Kur and
                  V{\'{a}}clav Maty{\'{a}}s and
                  Petr Svenda},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Evolutionary Design of Attack Strategies},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_2},
  doi          = {10.1007/978-3-642-36213-2\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/KurMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Meadows09,
  author       = {Catherine Meadows},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Deriving Ephemeral Authentication Using Channel Axioms},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {262--268},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_28},
  doi          = {10.1007/978-3-642-36213-2\_28},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Meadows09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell09,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {A Novel Stateless Authentication Protocol},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {269--274},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_29},
  doi          = {10.1007/978-3-642-36213-2\_29},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell09a,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {A Novel Stateless Authentication Protocol},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {275--281},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_30},
  doi          = {10.1007/978-3-642-36213-2\_30},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mukhamedov09,
  author       = {Aybek Mukhamedov},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Towards a Verified Reference Implementation of a Trusted Platform
                  Module},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {82--86},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_12},
  doi          = {10.1007/978-3-642-36213-2\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mukhamedov09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MukhamedovGR09,
  author       = {Aybek Mukhamedov and
                  Andrew D. Gordon and
                  Mark Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Towards a Verified Reference Implementation of a Trusted Platform
                  Module},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {69--81},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_11},
  doi          = {10.1007/978-3-642-36213-2\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/MukhamedovGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PavlovicM09,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Deriving Ephemeral Authentication Using Channel Axioms},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {240--261},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_27},
  doi          = {10.1007/978-3-642-36213-2\_27},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PavlovicM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Preibusch09,
  author       = {S{\"{o}}ren Preibusch},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Establishing Distributed Hidden Friendship Relations},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {335--342},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_36},
  doi          = {10.1007/978-3-642-36213-2\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Preibusch09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PreibuschB09,
  author       = {S{\"{o}}ren Preibusch and
                  Alastair R. Beresford},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Establishing Distributed Hidden Friendship Relations},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {321--334},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_35},
  doi          = {10.1007/978-3-642-36213-2\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PreibuschB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan09,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Pretty Good Democracy},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_16},
  doi          = {10.1007/978-3-642-36213-2\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanT09,
  author       = {Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Pretty Good Democracy},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_15},
  doi          = {10.1007/978-3-642-36213-2\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Svenda09,
  author       = {Petr Svenda},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Evolutionary Design of Attack Strategies},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {18--23},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_3},
  doi          = {10.1007/978-3-642-36213-2\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Svenda09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Syverson09,
  author       = {Paul Syverson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Why I'm Not an Entropist},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_25},
  doi          = {10.1007/978-3-642-36213-2\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Syverson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Syverson09a,
  author       = {Paul Syverson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Why I'm Not an Entropist},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {231--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_26},
  doi          = {10.1007/978-3-642-36213-2\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Syverson09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2006,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04904-0},
  doi          = {10.1007/978-3-642-04904-0},
  isbn         = {978-3-642-04903-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson08,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {What Next After Anonymity? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {223--231},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_30},
  doi          = {10.1007/978-3-642-22137-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonM08,
  author       = {Ross J. Anderson and
                  Steven J. Murdoch},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {What Next after Anonymity?},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {220--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_29},
  doi          = {10.1007/978-3-642-22137-8\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BahariG08,
  author       = {S. Farshad Bahari and
                  Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Handling New Adversaries in Wireless Ad-Hoc Networks},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {118--119},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_17},
  doi          = {10.1007/978-3-642-22137-8\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BahariG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze08,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Bridging the Gap between Vulnerabilities and Threats in Electronic
                  Voting (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {244--255},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_34},
  doi          = {10.1007/978-3-642-22137-8\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeC08,
  author       = {Matt Blaze and
                  Sandy Clark},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Bridging the Gap between Vulnerabilities and Threats in Electronic
                  Voting - Abstract},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {241--243},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_33},
  doi          = {10.1007/978-3-642-22137-8\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenLM08,
  author       = {Haibo Chen and
                  Jun Li and
                  Wenbo Mao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {TPM-Performance Sensible Key Management Protocols for Service Provisioning
                  in Cloud Computing},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {107--114},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_15},
  doi          = {10.1007/978-3-642-22137-8\_15},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/ChenLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson08,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Remodelling the Attacker (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_1},
  doi          = {10.1007/978-3-642-22137-8\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson08a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Security Protocol Deployment Risk (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {21--24},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_4},
  doi          = {10.1007/978-3-642-22137-8\_4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CvrcekD08,
  author       = {Daniel Cvrcek and
                  George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Fighting the 'Good' Internet War},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {3--11},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_2},
  doi          = {10.1007/978-3-642-22137-8\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CvrcekD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis08,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Covert Communications Despite Traffic Data Retention},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {198--214},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_27},
  doi          = {10.1007/978-3-642-22137-8\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis08a,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Covert Communications Despite Traffic Data Retention (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {215--219},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_28},
  doi          = {10.1007/978-3-642-22137-8\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyBB08,
  author       = {Simon N. Foley and
                  Giampaolo Bella and
                  Stefano Bistarelli},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Security Protocol Deployment Risk},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {12--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_3},
  doi          = {10.1007/978-3-642-22137-8\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor08,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {120--125},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_18},
  doi          = {10.1007/978-3-642-22137-8\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann08,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Problems with Same Origin Policy - Know Thyself},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {84--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_11},
  doi          = {10.1007/978-3-642-22137-8\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann08a,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Problems with Same Origin Policy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {86--92},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_12},
  doi          = {10.1007/978-3-642-22137-8\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao08,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Password Authenticated Key Exchange by Juggling (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {172--179},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_24},
  doi          = {10.1007/978-3-642-22137-8\_24},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoR08,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Password Authenticated Key Exchange by Juggling},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_23},
  doi          = {10.1007/978-3-642-22137-8\_23},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Johnson08,
  author       = {Matthew Johnson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {A Real World Application of Secure Multi-party Computations (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {191--197},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_26},
  doi          = {10.1007/978-3-642-22137-8\_26},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Johnson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JohnsonO08,
  author       = {Matthew Johnson and
                  Ralph Owen},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {A Real World Application of Secure Multi-party Computations (Duplicate
                  Bridge for Cheapskates)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {180--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_25},
  doi          = {10.1007/978-3-642-22137-8\_25},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JohnsonO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Krhovjak08,
  author       = {Jan Krhovjak},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Generating Random Numbers in Hostile Environments (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {51--53},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_8},
  doi          = {10.1007/978-3-642-22137-8\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Krhovjak08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KrhovjakSM08,
  author       = {Jan Krhovjak and
                  Andriy Stetsko and
                  Vashek Matyas},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Generating Random Numbers in Hostile Environments},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {38--50},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_7},
  doi          = {10.1007/978-3-642-22137-8\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KrhovjakSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao08,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {TPM-Performance Sensible Key Management Protocols for Service Provisioning
                  in Cloud Computing (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {115--117},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_16},
  doi          = {10.1007/978-3-642-22137-8\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Meier08,
  author       = {Jan Meier},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Do Not Model the Attacker},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {25--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_5},
  doi          = {10.1007/978-3-642-22137-8\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Meier08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Meier08a,
  author       = {Jan Meier},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Do Not Model the Attacker (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {36--37},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_6},
  doi          = {10.1007/978-3-642-22137-8\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Meier08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Murdoch08,
  author       = {Steven J. Murdoch},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Hardened Stateless Session Cookies},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {93--101},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_13},
  doi          = {10.1007/978-3-642-22137-8\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Murdoch08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Murdoch08a,
  author       = {Steven J. Murdoch},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Hardened Stateless Session Cookies (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {102--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_14},
  doi          = {10.1007/978-3-642-22137-8\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Murdoch08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nikander08,
  author       = {Pekka Nikander},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Towards Understanding Pure Publish/Subscribe Cryptographic Protocols
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {156--158},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_22},
  doi          = {10.1007/978-3-642-22137-8\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nikander08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NikanderM08,
  author       = {Pekka Nikander and
                  Giannis F. Marias},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Towards Understanding Pure Publish/Subscribe Cryptographic Protocols},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {144--155},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_21},
  doi          = {10.1007/978-3-642-22137-8\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NikanderM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe08,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Problems of Provenance for Digital Libraries},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {126--133},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_19},
  doi          = {10.1007/978-3-642-22137-8\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe08a,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Problems of Provenance for Digital Libraries (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {134--143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_20},
  doi          = {10.1007/978-3-642-22137-8\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan08,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Remodelling the Attacker in Voting Protocols},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {232--234},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_31},
  doi          = {10.1007/978-3-642-22137-8\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan08a,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Remodelling the Attacker in Voting Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {235--240},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_32},
  doi          = {10.1007/978-3-642-22137-8\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano08,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Cyberdice (Transcript of Discussion)},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_10},
  doi          = {10.1007/978-3-642-22137-8\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StajanoC08,
  author       = {Frank Stajano and
                  Richard Clayton},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters},
  booktitle    = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
                  UK, April 16-18, 2008. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6615},
  pages        = {54--70},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-22137-8\_9},
  doi          = {10.1007/978-3-642-22137-8\_9},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StajanoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AdidaBCLAR07,
  author       = {Ben Adida and
                  Mike Bond and
                  Jolyon Clulow and
                  Amerson Lin and
                  Ross J. Anderson and
                  Ronald L. Rivest},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On the Security of the {EMV} Secure Messaging {API} (Extended Abstract)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {147--149},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_17},
  doi          = {10.1007/978-3-642-17773-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AdidaBCLAR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AuraBRZ07,
  author       = {Tuomas Aura and
                  Moritz Becker and
                  Michael Roe and
                  Piotr Zielinski},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Reconciling Multiple IPsec and Firewall Policies},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {81--97},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_9},
  doi          = {10.1007/978-3-642-17773-6\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AuraBRZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson07,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {When Is a Protocol Broken? (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_1},
  doi          = {10.1007/978-3-642-17773-6\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson07a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {139--146},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_16},
  doi          = {10.1007/978-3-642-17773-6\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonCMR07,
  author       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Instructions to Reviewers},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {256},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_30},
  doi          = {10.1007/978-3-642-17773-6\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonCMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonL07,
  author       = {Bruce Christianson and
                  Jun Li},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Multi-Channel Key Agreement Using Encrypted Public Key Exchange},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {133--138},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_15},
  doi          = {10.1007/978-3-642-17773-6\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clulow07,
  author       = {Jolyon Clulow},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On the Security of the {EMV} Secure Messaging {API} (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {150--151},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_18},
  doi          = {10.1007/978-3-642-17773-6\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Clulow07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clulow07a,
  author       = {Jolyon Clulow},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Robbing the Bank with a Theorem Prover - (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {172--177},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_22},
  doi          = {10.1007/978-3-642-17773-6\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Clulow07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis07,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Private Yet Abuse Resistant Open Publishing (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {244--255},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_29},
  doi          = {10.1007/978-3-642-17773-6\_29},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/DanezisL07,
  author       = {George Danezis and
                  Ben Laurie},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Private Yet Abuse Resistant Open Publishing},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {222--243},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_28},
  doi          = {10.1007/978-3-642-17773-6\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/DanezisL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Granado07,
  author       = {Marcus C. Granado},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Resiliency Aspects of Security Protocols},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {37--57},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_6},
  doi          = {10.1007/978-3-642-17773-6\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Granado07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hoepman07,
  author       = {Jaap{-}Henk Hoepman},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Distributed Double Spending Prevention},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_19},
  doi          = {10.1007/978-3-642-17773-6\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hoepman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hoepman07a,
  author       = {Jaap{-}Henk Hoepman},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Distributed Double Spending Prevention (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {166--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_20},
  doi          = {10.1007/978-3-642-17773-6\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hoepman07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KataokaUHY07,
  author       = {Haruno Kataoka and
                  Akira Utsumi and
                  Yuki Hirose and
                  Hiroshi Yoshiura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Disclosure Control of Natural Language Information to Enable Secure
                  and Enjoyable Communication over the Internet},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {178--188},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_23},
  doi          = {10.1007/978-3-642-17773-6\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KataokaUHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lin07,
  author       = {Amerson Lin},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modeling Partial Attacks with Alloy (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {34--36},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_5},
  doi          = {10.1007/978-3-642-17773-6\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LinBC07,
  author       = {Amerson Lin and
                  Mike Bond and
                  Jolyon Clulow},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modeling Partial Attacks with Alloy},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_4},
  doi          = {10.1007/978-3-642-17773-6\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LinBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MaoYYC07,
  author       = {Wenbo Mao and
                  Fei Yan and
                  Chuanjiang Yi and
                  Haibo Chen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened
                  Software Environment},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_27},
  doi          = {10.1007/978-3-642-17773-6\_27},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/MaoYYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nagaraja07,
  author       = {Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy Amplification with Social Networks},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {58--73},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_7},
  doi          = {10.1007/978-3-642-17773-6\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nagaraja07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nagaraja07a,
  author       = {Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy Amplification with Social Networks (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {74--80},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_8},
  doi          = {10.1007/978-3-642-17773-6\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nagaraja07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe07,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {98--103},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_10},
  doi          = {10.1007/978-3-642-17773-6\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Sherr07,
  author       = {Micah Sherr},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Measurable Security through Isotropic Channels (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {13--19},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_3},
  doi          = {10.1007/978-3-642-17773-6\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Sherr07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SherrCB07,
  author       = {Micah Sherr and
                  Eric Cronin and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Measurable Security through Isotropic Channels},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_2},
  doi          = {10.1007/978-3-642-17773-6\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SherrCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Tjostheim07,
  author       = {Thomas Tj{\o}stheim},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Model for System-Based Analysis of Voting Systems (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {131--132},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_14},
  doi          = {10.1007/978-3-642-17773-6\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Tjostheim07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/TjostheimPR07,
  author       = {Thomas Tj{\o}stheim and
                  Thea Peacock and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Model for System-Based Analysis of Voting Systems},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_13},
  doi          = {10.1007/978-3-642-17773-6\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/TjostheimPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yasinsac07,
  author       = {Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards Working with Small Atomic Functions - (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {201--203},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_26},
  doi          = {10.1007/978-3-642-17773-6\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yasinsac07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YasinsacM07,
  author       = {Alec Yasinsac and
                  Jeffrey Todd McDonald},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards Working with Small Atomic Functions},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_25},
  doi          = {10.1007/978-3-642-17773-6\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YasinsacM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yoshiura07,
  author       = {Hiroshi Yoshiura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Disclosure Control of Natural Language Information to Enable Secure
                  and Enjoyable Communication over the Internet - (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {189--190},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_24},
  doi          = {10.1007/978-3-642-17773-6\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yoshiura07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YounABCHLRA07,
  author       = {Paul Youn and
                  Ben Adida and
                  Mike Bond and
                  Jolyon Clulow and
                  Jonathan Herzog and
                  Amerson Lin and
                  Ronald L. Rivest and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Robbing the Bank with a Theorem Prover - (Abstract)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {171},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_21},
  doi          = {10.1007/978-3-642-17773-6\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YounABCHLRA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Zugenmaier07,
  author       = {Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Anchor-Less Secure Session Mobility (Transcript of Discussion)},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {110--113},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_12},
  doi          = {10.1007/978-3-642-17773-6\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Zugenmaier07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ZugenmaierLPS07,
  author       = {Alf Zugenmaier and
                  Julien Laganier and
                  Anand R. Prasad and
                  Kristian Slavov},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Anchor-Less Secure Session Mobility},
  booktitle    = {Security Protocols - 15th International Workshop, Brno, Czech Republic,
                  April 18-20, 2007. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5964},
  pages        = {104--109},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-17773-6\_11},
  doi          = {10.1007/978-3-642-17773-6\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ZugenmaierLPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2005,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77156-2},
  doi          = {10.1007/978-3-540-77156-2},
  isbn         = {978-3-540-77155-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AdidaBCLMAR06,
  author       = {Ben Adida and
                  Mike Bond and
                  Jolyon Clulow and
                  Amerson Lin and
                  Steven J. Murdoch and
                  Ross J. Anderson and
                  Ronald L. Rivest},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Phish and Chips},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {40--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_7},
  doi          = {10.1007/978-3-642-04904-0\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AdidaBCLMAR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson06,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Man-in-the-Middle Defence},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {157--163},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_21},
  doi          = {10.1007/978-3-642-04904-0\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonB06,
  author       = {Ross J. Anderson and
                  Mike Bond},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Man-in-the-Middle Defence},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {153--156},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_20},
  doi          = {10.1007/978-3-642-04904-0\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Beresford06,
  author       = {Alastair R. Beresford},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy-Sensitive Congestion Charging},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {105--111},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_14},
  doi          = {10.1007/978-3-642-04904-0\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Beresford06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BeresfordDH06,
  author       = {Alastair R. Beresford and
                  Jonathan J. Davies and
                  Robert K. Harle},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy-Sensitive Congestion Charging},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {97--104},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_13},
  doi          = {10.1007/978-3-642-04904-0\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BeresfordDH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze06,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Composing Security Metrics},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_2},
  doi          = {10.1007/978-3-642-04904-0\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bond06,
  author       = {Mike Bond},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Phish and Chips},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {49--51},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_8},
  doi          = {10.1007/978-3-642-04904-0\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bond06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson06,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Putting the Human Back in the Protocol},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_1},
  doi          = {10.1007/978-3-642-04904-0\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonS06,
  author       = {Bruce Christianson and
                  Alexander V. Shafarenko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Vintage Bit Cryptography},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {261--265},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_34},
  doi          = {10.1007/978-3-642-04904-0\_34},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CvrcekKMD06,
  author       = {Daniel Cvrcek and
                  Marek Kumpost and
                  Vashek Matyas and
                  George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Value of Location Information},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {112--121},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_15},
  doi          = {10.1007/978-3-642-04904-0\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CvrcekKMD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gentry06,
  author       = {Craig Gentry},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Distributed Human Computation},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {181--189},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_25},
  doi          = {10.1007/978-3-642-04904-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gentry06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GentryRS06,
  author       = {Craig Gentry and
                  Zulfikar Ramzan and
                  Stuart G. Stubblebine},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Distributed Human Computation},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {177--180},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_24},
  doi          = {10.1007/978-3-642-04904-0\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GentryRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao06,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A 2-Round Anonymous Veto Protocol},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {212--214},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_29},
  doi          = {10.1007/978-3-642-04904-0\_29},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoZ06,
  author       = {Feng Hao and
                  Piotr Zielinski},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A 2-Round Anonymous Veto Protocol},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {202--211},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_28},
  doi          = {10.1007/978-3-642-04904-0\_28},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Heather06,
  author       = {James Heather},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Where Next for Formal Methods?},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {59--61},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_10},
  doi          = {10.1007/978-3-642-04904-0\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Heather06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HeatherW06,
  author       = {James Heather and
                  Kun Wei},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Where Next for Formal Methods?},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {52--58},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_9},
  doi          = {10.1007/978-3-642-04904-0\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HeatherW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Johnson06,
  author       = {Matthew Johnson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Usability of Security Management: Defining the Permissions of Guests},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {284--285},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_37},
  doi          = {10.1007/978-3-642-04904-0\_37},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Johnson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JohnsonS06,
  author       = {Matthew Johnson and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Usability of Security Management: Defining the Permissions of Guests},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {276--283},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_36},
  doi          = {10.1007/978-3-642-04904-0\_36},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JohnsonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lim06,
  author       = {Hoon Wei Lim},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secret Public Key Protocols Revisited},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {257--260},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_33},
  doi          = {10.1007/978-3-642-04904-0\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lim06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LimP06,
  author       = {Hoon Wei Lim and
                  Kenneth G. Paterson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secret Public Key Protocols Revisited},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {237--256},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_32},
  doi          = {10.1007/978-3-642-04904-0\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LimP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao06,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Innovations for Grid Security from Trusted Computing},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {150--152},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_19},
  doi          = {10.1007/978-3-642-04904-0\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MaoMJZ06,
  author       = {Wenbo Mao and
                  Andrew P. Martin and
                  Hai Jin and
                  Huanguo Zhang},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Innovations for Grid Security from Trusted Computing},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {132--149},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_18},
  doi          = {10.1007/978-3-642-04904-0\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MaoMJZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Matyas06,
  author       = {Vashek Matyas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Value of Location Information},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {122--127},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_16},
  doi          = {10.1007/978-3-642-04904-0\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Matyas06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Matyas06a,
  author       = {Vashek Matyas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Update on {PIN} or Signature},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {128--131},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_17},
  doi          = {10.1007/978-3-642-04904-0\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Matyas06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell06,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Using Human Interactive Proofs to Secure Human-Machine Interactions
                  via Untrusted Intermediaries},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {164--170},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_22},
  doi          = {10.1007/978-3-642-04904-0\_22},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell06a,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Using Human Interactive Proofs to Secure Human-Machine Interactions
                  via Untrusted Intermediaries},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {171--176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_23},
  doi          = {10.1007/978-3-642-04904-0\_23},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MyrvangS06,
  author       = {Per Harald Myrvang and
                  Tage Stabell{-}Kul{\o}},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Cordial Security Protocol Programming},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {62--84},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_11},
  doi          = {10.1007/978-3-642-04904-0\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MyrvangS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nair06,
  author       = {Srijith K. Nair},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Secure Application-Semantic Aware Policy Enforcement Architecture},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {32--39},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_6},
  doi          = {10.1007/978-3-642-04904-0\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nair06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NairCT06,
  author       = {Srijith K. Nair and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Secure Application-Semantic Aware Policy Enforcement Architecture},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {26--31},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_5},
  doi          = {10.1007/978-3-642-04904-0\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NairCT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/OGorman06,
  author       = {Lawrence O'Gorman},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {How to Speak an Authentication Secret Securely from an Eavesdropper},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {230--236},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_31},
  doi          = {10.1007/978-3-642-04904-0\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/OGorman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/OGormanBS06,
  author       = {Lawrence O'Gorman and
                  Lynne Shapiro Brotman and
                  Michael J. Sammon},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {How to Speak an Authentication Secret Securely from an Eavesdropper},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_30},
  doi          = {10.1007/978-3-642-04904-0\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/OGormanBS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan06,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Putting the Human Back in Voting Protocols},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {20--25},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_4},
  doi          = {10.1007/978-3-642-04904-0\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanP06,
  author       = {Peter Y. A. Ryan and
                  Thea Peacock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Putting the Human Back in Voting Protocols},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {13--19},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_3},
  doi          = {10.1007/978-3-642-04904-0\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Shafarenko06,
  author       = {Alexander V. Shafarenko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Vintage Bit Cryptography},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_35},
  doi          = {10.1007/978-3-642-04904-0\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Shafarenko06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stabell-Kulo06,
  author       = {Tage Stabell{-}Kul{\o}},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Cordial Security Protocol Programming},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_12},
  doi          = {10.1007/978-3-642-04904-0\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stabell-Kulo06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/X06,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Eve - The Last Word},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {286},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_38},
  doi          = {10.1007/978-3-642-04904-0\_38},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/X06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan06,
  author       = {Jeff Yan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Bot, Cyborg and Automated Turing Test},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {190--197},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_26},
  doi          = {10.1007/978-3-642-04904-0\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan06a,
  author       = {Jeff Yan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Bot, Cyborg and Automated Turing Test},
  booktitle    = {Security Protocols, 14th International Workshop, Cambridge, UK, March
                  27-29, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5087},
  pages        = {198--201},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-642-04904-0\_27},
  doi          = {10.1007/978-3-642-04904-0\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2004,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11861386},
  doi          = {10.1007/11861386},
  isbn         = {3-540-40925-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson05,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Initial Costs and Maintenance Costs of Protocols},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {333--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_42},
  doi          = {10.1007/978-3-540-77156-2\_42},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson05a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Initial Costs and Maintenance Costs of Protocols},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {336--343},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_43},
  doi          = {10.1007/978-3-540-77156-2\_43},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArkkoNN05,
  author       = {Jari Arkko and
                  Pekka Nikander and
                  Mats N{\"{a}}slund},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enhancing Privacy with Shared Pseudo Random Sequences},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {187--196},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_22},
  doi          = {10.1007/978-3-540-77156-2\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArkkoNN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Aura05,
  author       = {Tuomas Aura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Experiences with Host-to-Host IPsec},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {23--30},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_3},
  doi          = {10.1007/978-3-540-77156-2\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Aura05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AuraRM05,
  author       = {Tuomas Aura and
                  Michael Roe and
                  Anish Mohammed},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Experiences with Host-to-Host IPsec},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_2},
  doi          = {10.1007/978-3-540-77156-2\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AuraRM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze05,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Listen Too Closely and You May Be Confused},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {250--257},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_31},
  doi          = {10.1007/978-3-540-77156-2\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bond05,
  author       = {Mike Bond},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dining Freemasons (Security Protocols for Secret Societies)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_33},
  doi          = {10.1007/978-3-540-77156-2\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bond05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BondD05,
  author       = {Mike Bond and
                  George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dining Freemasons (Security Protocols for Secret Societies)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {258--265},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_32},
  doi          = {10.1007/978-3-540-77156-2\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BondD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterMY05,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Community-Centric Vanilla-Rollback Access, or: How {I} Stopped Worrying
                  and Learned to Love My Computer},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {228--237},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_28},
  doi          = {10.1007/978-3-540-77156-2\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterMY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenLM05,
  author       = {Liqun Chen and
                  Hoon Wei Lim and
                  Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {User-Friendly Grid Security Architecture and Protocols},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {139--156},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_17},
  doi          = {10.1007/978-3-540-77156-2\_17},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChenLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChowdhuryCM05,
  author       = {Partha Das Chowdhury and
                  Bruce Christianson and
                  James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Anonymous Context Based Role Activation Mechanism},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {315--321},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_39},
  doi          = {10.1007/978-3-540-77156-2\_39},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChowdhuryCM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson05,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The System Likes You},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_1},
  doi          = {10.1007/978-3-540-77156-2\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson05a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Anonymous Context Based Role Activation Mechanism},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {322--328},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_40},
  doi          = {10.1007/978-3-540-77156-2\_40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clayton05,
  author       = {Richard Clayton},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Insecure Real-World Authentication Protocols (or Why Phishing Is So
                  Profitable)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {82--88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_10},
  doi          = {10.1007/978-3-540-77156-2\_10},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Clayton05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Clayton05a,
  author       = {Richard Clayton},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Insecure Real-World Authentication Protocols (or Why Phishing Is So
                  Profitable)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_11},
  doi          = {10.1007/978-3-540-77156-2\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Clayton05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CroninSB05,
  author       = {Eric Cronin and
                  Micah Sherr and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Listen Too Closely and You May Be Confused},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {245--249},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_30},
  doi          = {10.1007/978-3-540-77156-2\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CroninSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CvrcekKM05,
  author       = {Daniel Cvrcek and
                  Jan Krhovjak and
                  Vashek Matyas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{PIN} (and Chip) or Signature: Beating the Cheating?},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {69--75},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_8},
  doi          = {10.1007/978-3-540-77156-2\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CvrcekKM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt05,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Understanding Why Some Network Protocols Are User-Unfriendly},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {215--219},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_26},
  doi          = {10.1007/978-3-540-77156-2\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Desmedt05a,
  author       = {Yvo Desmedt},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Understanding Why Some Network Protocols Are User-Unfriendly},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {220--227},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_27},
  doi          = {10.1007/978-3-540-77156-2\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Desmedt05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley05,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Authorisation Subterfuge by Delegation in Decentralised Networks},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {103--111},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_13},
  doi          = {10.1007/978-3-540-77156-2\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Foley05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyZ05,
  author       = {Simon N. Foley and
                  Hongbin Zhou},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Authorisation Subterfuge by Delegation in Decentralised Networks},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {97--102},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_12},
  doi          = {10.1007/978-3-540-77156-2\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor05,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On the Evolution of Adversary Models in Security Protocols (or Know
                  Your Friend and Foe Alike)},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {276--283},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_34},
  doi          = {10.1007/978-3-540-77156-2\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gordon05,
  author       = {John Gordon},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Alice and Bob},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {344--345},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_44},
  doi          = {10.1007/978-3-540-77156-2\_44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gordon05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GunawardenaSZD05,
  author       = {Dinan Gunawardena and
                  Jacob Scott and
                  Alf Zugenmaier and
                  Austin Donnelly},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Countering Automated Exploits with System Security {CAPTCHAS}},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {162--169},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_19},
  doi          = {10.1007/978-3-540-77156-2\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GunawardenaSZD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao05,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Combining Crypto with Biometrics: {A} New Human-Security Interface},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {133--138},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_16},
  doi          = {10.1007/978-3-540-77156-2\_16},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Johnson05,
  author       = {Matthew Johnson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Implementing a Multi-hat {PDA}},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {308--314},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_38},
  doi          = {10.1007/978-3-540-77156-2\_38},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Johnson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JohnsonS05,
  author       = {Matthew Johnson and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Implementing a Multi-hat {PDA}},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {295--307},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_37},
  doi          = {10.1007/978-3-540-77156-2\_37},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JohnsonS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Laurie05,
  author       = {Ben Laurie},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Safer Scripting Through Precompilation},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {284--288},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_35},
  doi          = {10.1007/978-3-540-77156-2\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Laurie05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Laurie05a,
  author       = {Ben Laurie},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Safer Scripting Through Precompilation},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {289--294},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_36},
  doi          = {10.1007/978-3-540-77156-2\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Laurie05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lim05,
  author       = {Hoon Wei Lim},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {User-Friendly Grid Security Architecture and Protocols},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {157--161},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_18},
  doi          = {10.1007/978-3-540-77156-2\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lim05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas05,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The System Likes You?},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {180--186},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_21},
  doi          = {10.1007/978-3-540-77156-2\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Matyas05,
  author       = {Vashek Matyas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{PIN} (and Chip) or Signature: Beating the Cheating?},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {76--81},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_9},
  doi          = {10.1007/978-3-540-77156-2\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Matyas05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Medeiros05,
  author       = {Breno de Medeiros},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Community-Centric Vanilla-Rollback Access, or: How {I} Stopped Worrying
                  and Learned to Love My Computer},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {238--244},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_29},
  doi          = {10.1007/978-3-540-77156-2\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Medeiros05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nagaraja05,
  author       = {Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Topology of Covert Conflict},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {329--332},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_41},
  doi          = {10.1007/978-3-540-77156-2\_41},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nagaraja05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nikander05,
  author       = {Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enhancing Privacy with Shared Pseudo Random Sequences},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {197--203},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_23},
  doi          = {10.1007/978-3-540-77156-2\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nikander05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Rieback05,
  author       = {Melanie R. Rieback},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keep on Blockin' in the Free World},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_7},
  doi          = {10.1007/978-3-540-77156-2\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Rieback05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RiebackCT05,
  author       = {Melanie R. Rieback and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keep on Blockin' in the Free World: Personal Access Control for Low-Cost
                  {RFID} Tags},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {51--59},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_6},
  doi          = {10.1007/978-3-540-77156-2\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RiebackCT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe05,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Non-repudiation and the Metaphysics of Presence},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {204--206},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_24},
  doi          = {10.1007/978-3-540-77156-2\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe05a,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Non-repudiation and the Metaphysics of Presence},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {207--214},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_25},
  doi          = {10.1007/978-3-540-77156-2\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano05,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Repairing the Bluetooth Pairing Protocol},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {46--50},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_5},
  doi          = {10.1007/978-3-540-77156-2\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wong05,
  author       = {Ford{-}Long Wong},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Multi-channel Protocols},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {128--132},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_15},
  doi          = {10.1007/978-3-540-77156-2\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wong05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WongS05,
  author       = {Ford{-}Long Wong and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Multi-channel Protocols},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_14},
  doi          = {10.1007/978-3-540-77156-2\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WongS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WongSC05,
  author       = {Ford{-}Long Wong and
                  Frank Stajano and
                  Jolyon Clulow},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Repairing the Bluetooth Pairing Protocol},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_4},
  doi          = {10.1007/978-3-540-77156-2\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WongSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Zugenmaier05,
  author       = {Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Countering Automated Exploits with System Security {CAPTCHAS}},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {170--179},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_20},
  doi          = {10.1007/978-3-540-77156-2\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Zugenmaier05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2003,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11542322},
  doi          = {10.1007/11542322},
  isbn         = {3-540-28389-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson04,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dancing Bear: {A} New Way of Composing Ciphers},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {231--238},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_26},
  doi          = {10.1007/11861386\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson04a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Dancing Bear: {A} New Way of Composing Ciphers (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {239--245},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_27},
  doi          = {10.1007/11861386\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Aura04,
  author       = {Tuomas Aura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy, Control and Internet Mobility (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {146--150},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_15},
  doi          = {10.1007/11861386\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Aura04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AuraZ04,
  author       = {Tuomas Aura and
                  Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy, Control and Internet Mobility},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {133--145},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_14},
  doi          = {10.1007/11861386\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AuraZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bangerter04,
  author       = {Endre Bangerter},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Cryptographic Framework for the Controlled Release of Certified
                  Data (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {43--50},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_5},
  doi          = {10.1007/11861386\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bangerter04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BangerterCL04,
  author       = {Endre Bangerter and
                  Jan Camenisch and
                  Anna Lysyanskaya},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Cryptographic Framework for the Controlled Release of Certified
                  Data},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {20--42},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_4},
  doi          = {10.1007/11861386\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BangerterCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze04,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Toward a Broader View of Security Protocols},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {106--120},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_12},
  doi          = {10.1007/11861386\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze04a,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Toward a Broader View of Security Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {121--132},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_13},
  doi          = {10.1007/11861386\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BohmLMMZ04,
  author       = {Denis Bohm and
                  Mik Lamming and
                  Robert N. Mayo and
                  Jeff Morgan and
                  Kan Zhang},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Controlling Who Tracks Me},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {151--154},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_16},
  doi          = {10.1007/11861386\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BohmLMMZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterDWY04,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Rebecca N. Wright and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Accountable Privacy},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {83--95},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_10},
  doi          = {10.1007/11861386\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterDWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bussard04,
  author       = {Laurent Bussard},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Establishing Trust with Privacy (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {210--212},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_23},
  doi          = {10.1007/11861386\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bussard04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BussardM04,
  author       = {Laurent Bussard and
                  Refik Molva},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Establishing Trust with Privacy},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_22},
  doi          = {10.1007/11861386\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BussardM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChowdhuryCM04,
  author       = {Partha Das Chowdhury and
                  Bruce Christianson and
                  James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Anonymous Authentication},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {299--305},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_36},
  doi          = {10.1007/11861386\_36},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChowdhuryCM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson04,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Introduction: Authentic Privacy},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_1},
  doi          = {10.1007/11861386\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson04a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Anonymous Authentication (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {306--311},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_37},
  doi          = {10.1007/11861386\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Cvrcek04,
  author       = {Daniel Cvrcek},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {275},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_32},
  doi          = {10.1007/11861386\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Cvrcek04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CvrcekM04,
  author       = {Daniel Cvrcek and
                  V{\'{a}}clav Maty{\'{a}}s Jr.},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Pseudonymity in the Light of Evidence-Based Trust},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {267--274},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_31},
  doi          = {10.1007/11861386\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CvrcekM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Eronen04,
  author       = {Pasi Eronen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Authentication Components: Engineering Experiences and Guidelines
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {78--82},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_9},
  doi          = {10.1007/11861386\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Eronen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/EronenA04,
  author       = {Pasi Eronen and
                  Jari Arkko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Authentication Components: Engineering Experiences and Guidelines},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {68--77},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_8},
  doi          = {10.1007/11861386\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/EronenA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor04,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security of Emergent Properties in Ad-Hoc Networks (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {256--266},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_30},
  doi          = {10.1007/11861386\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann04,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Identity and Location},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {246--250},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_28},
  doi          = {10.1007/11861386\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann04a,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Identity and Location (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {251--255},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_29},
  doi          = {10.1007/11861386\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hashimoto04,
  author       = {Mikio Hashimoto},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Processor Consistent with Both Foreign Software Protection
                  and User Privacy Protection (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {287--290},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_34},
  doi          = {10.1007/11861386\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hashimoto04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HashimotoHK04,
  author       = {Mikio Hashimoto and
                  Hiroyoshi Haruki and
                  Takeshi Kawabata},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Processor Consistent with Both Foreign Software Protection
                  and User Privacy Protection},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {276--286},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_33},
  doi          = {10.1007/11861386\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HashimotoHK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas04,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Why Are We Authenticating (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {291--298},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_35},
  doi          = {10.1007/11861386\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Massacci04,
  author       = {Fabio Massacci},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy is Linking Permission to Purpose (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {192--198},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_21},
  doi          = {10.1007/11861386\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Massacci04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciZ04,
  author       = {Fabio Massacci and
                  Nicola Zannone},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Privacy Is Linking Permission to Purpose},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {179--191},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_20},
  doi          = {10.1007/11861386\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mayo04,
  author       = {Robert N. Mayo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Controlling Who Tracks Me (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {155--162},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_17},
  doi          = {10.1007/11861386\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mayo04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mitchell04,
  author       = {Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Limits to Anonymity When Using Credentials (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {13--19},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_3},
  doi          = {10.1007/11861386\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mitchell04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PashalidisM04,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Limits to Anonymity When Using Credentials},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {4--12},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_2},
  doi          = {10.1007/11861386\_2},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PashalidisM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Popescu04,
  author       = {Bogdan C. Popescu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat
                  the System (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {221--230},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_25},
  doi          = {10.1007/11861386\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Popescu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PopescuCT04,
  author       = {Bogdan C. Popescu and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat
                  the System},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_24},
  doi          = {10.1007/11861386\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PopescuCT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Rissanen04,
  author       = {Erik Rissanen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Mechanism for Discretionary Overriding of Access Control
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {320--323},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_39},
  doi          = {10.1007/11861386\_39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Rissanen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RissanenFS04,
  author       = {Erik Rissanen and
                  Babak Sadighi Firozabadi and
                  Marek J. Sergot},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Mechanism for Discretionary Overriding of Access Control},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {312--319},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_38},
  doi          = {10.1007/11861386\_38},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RissanenFS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano04,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet
                  Usable {PDA}},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_6},
  doi          = {10.1007/11861386\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano04a,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {65--67},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_7},
  doi          = {10.1007/11861386\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wheeler04,
  author       = {David Wheeler},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Last Orders},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {324},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_40},
  doi          = {10.1007/11861386\_40},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wheeler04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wright04,
  author       = {Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Accountable Privacy (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_11},
  doi          = {10.1007/11861386\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wright04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ylitalo04,
  author       = {Jukka Ylitalo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{BLIND:} {A} Complete Identity Protection Framework for End-Points
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {177--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_19},
  doi          = {10.1007/11861386\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ylitalo04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YlitaloN04,
  author       = {Jukka Ylitalo and
                  Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{BLIND:} {A} Complete Identity Protection Framework for End-Points},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {163--176},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_18},
  doi          = {10.1007/11861386\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YlitaloN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2002,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b94819},
  doi          = {10.1007/B94819},
  isbn         = {3-540-20830-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson03,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {What We Can Learn from {API} Security},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {288--300},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_35},
  doi          = {10.1007/11542322\_35},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Arkko03,
  author       = {Jari Arkko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Limitations of IPsec Policy Mechanisms (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {252--254},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_30},
  doi          = {10.1007/11542322\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Arkko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArkkoN03,
  author       = {Jari Arkko and
                  Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Limitations of IPsec Policy Mechanisms},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {241--251},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_29},
  doi          = {10.1007/11542322\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArkkoN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Asokan03,
  author       = {N. Asokan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {42--48},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_7},
  doi          = {10.1007/11542322\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Asokan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AsokanNN03,
  author       = {N. Asokan and
                  Valtteri Niemi and
                  Kaisa Nyberg},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Man-in-the-Middle in Tunnelled Authentication Protocols},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {28--41},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_6},
  doi          = {10.1007/11542322\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AsokanNN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella03,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Protocol's Life After Attacks... (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {11--18},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_3},
  doi          = {10.1007/11542322\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaBM03,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli and
                  Fabio Massacci},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Protocol's Life After Attacks...},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_2},
  doi          = {10.1007/11542322\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaBM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaBM03a,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli and
                  Fabio Martinelli},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Biometrics to Enhance Smartcard Security},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {324--332},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_39},
  doi          = {10.1007/11542322\_39},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaBM03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaLP03,
  author       = {Giampaolo Bella and
                  Cristiano Longo and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Is the Verification Problem for Cryptographic Protocols Solved?},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {183--189},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_23},
  doi          = {10.1007/11542322\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze03,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{WAR:} Wireless Anonymous Routing (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {233--240},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_28},
  doi          = {10.1007/11542322\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeIKMR03,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Tal Malkin and
                  Aviel D. Rubin},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{WAR:} Wireless Anonymous Routing},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_27},
  doi          = {10.1007/11542322\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BonattiVS03,
  author       = {Piero A. Bonatti and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards Flexible Credential Negotiation Protocols},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {19--23},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_4},
  doi          = {10.1007/11542322\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BonattiVS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BoydMP03,
  author       = {Colin Boyd and
                  Wenbo Mao and
                  Kenneth G. Paterson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Deniable Authenticated Key Establishment for Internet Protocols},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {255--271},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_31},
  doi          = {10.1007/11542322\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BoydMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterY03,
  author       = {Mike Burmester and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {274--282},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_33},
  doi          = {10.1007/11542322\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson03,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Where Have All the Protocols Gone?},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_1},
  doi          = {10.1007/11542322\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson03a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Sessions from Weak Secrets (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {206--212},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_25},
  doi          = {10.1007/11542322\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonRW03,
  author       = {Bruce Christianson and
                  Michael Roe and
                  David Wheeler},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Secure Sessions from Weak Secrets},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_24},
  doi          = {10.1007/11542322\_24},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dam03,
  author       = {Mads Dam},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Regular {SPKI}},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_18},
  doi          = {10.1007/11542322\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Dam03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dam03a,
  author       = {Mads Dam},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Regular {SPKI} (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {151--152},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_19},
  doi          = {10.1007/11542322\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Dam03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley03,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Framework for Autonomic Security Protocols (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {55--62},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_9},
  doi          = {10.1007/11542322\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FoleyZ03,
  author       = {Simon N. Foley and
                  Hongbin Zhou},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Framework for Autonomic Security Protocols},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {49--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_8},
  doi          = {10.1007/11542322\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/FoleyZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor03,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Guaranteeing Access in Spite of Distributed Service-Flooding Attacks},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {80--96},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_12},
  doi          = {10.1007/11542322\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor03a,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
                  (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {97--105},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_13},
  doi          = {10.1007/11542322\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KuleszaK03,
  author       = {Kamil Kulesza and
                  Zbigniew Kotulski},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Addressing New Challenges by Building Security Protocols Around Graphs},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {301--306},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_36},
  doi          = {10.1007/11542322\_36},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KuleszaK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Malcolm03,
  author       = {James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Blind Publication: {A} Copyright Library without Publication or Trust},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {336--340},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_41},
  doi          = {10.1007/11542322\_41},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Malcolm03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Malcolm03a,
  author       = {James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Blind Publication: {A} Copyright Library Without Publication or Trust
                  (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {341--349},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_42},
  doi          = {10.1007/11542322\_42},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Malcolm03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao03,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Deniable Authenticated Key Establishment for Internet Protocols (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {272--273},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_32},
  doi          = {10.1007/11542322\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Martinelli03,
  author       = {Fabio Martinelli},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Biometrics to Enhance Smartcard Security (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {333--335},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_40},
  doi          = {10.1007/11542322\_40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Martinelli03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Monahan03,
  author       = {Brian Monahan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {From Security Protocols to Systems Security},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {307--322},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_37},
  doi          = {10.1007/11542322\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Monahan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Monahan03a,
  author       = {Brian Monahan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {From Security Protocols to Systems Security (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {323--323},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_38},
  doi          = {10.1007/11542322\_38},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Monahan03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Pfitzmann03,
  author       = {Birgit Pfitzmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Federated Identity-Management Protocols (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {175--177},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_21},
  doi          = {10.1007/11542322\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Pfitzmann03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PfitzmannW03,
  author       = {Birgit Pfitzmann and
                  Michael Waidner},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Federated Identity-Management Protocols},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {153--174},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_20},
  doi          = {10.1007/11542322\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PfitzmannW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Popescu03,
  author       = {Bogdan C. Popescu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enforcing Security Policies for Distributed Objects Applications (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {131--133},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_17},
  doi          = {10.1007/11542322\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Popescu03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PopescuCTZ03,
  author       = {Bogdan C. Popescu and
                  Bruno Crispo and
                  Andrew S. Tanenbaum and
                  Maas Zeeman},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enforcing Security Policies for Distributed Objects Applications},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_16},
  doi          = {10.1007/11542322\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PopescuCTZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Price03,
  author       = {Geraint Price},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Client v. Server Side Protocols, Interfaces and Storage},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {63--73},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_10},
  doi          = {10.1007/11542322\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Price03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Price03a,
  author       = {Geraint Price},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Client v. Server Side Protocols, Interfaces and Storage (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {74--79},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_11},
  doi          = {10.1007/11542322\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Price03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe03,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Panel Session: Is Protocol Modelling Finished?},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {213--217},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_26},
  doi          = {10.1007/11542322\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan03,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Enforcing the Unenforceable},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {178--182},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_22},
  doi          = {10.1007/11542322\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SaidiSD03,
  author       = {Hassen Sa{\"{\i}}di and
                  Victoria Stavridou and
                  Bruno Dutertre},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocol Codesign},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {106--113},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_14},
  doi          = {10.1007/11542322\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SaidiSD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Samarati03,
  author       = {Pierangela Samarati},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards Flexible Credential Negotiation Protocols (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {24--27},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_5},
  doi          = {10.1007/11542322\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Samarati03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stavridou03,
  author       = {Victoria Stavridou},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocol Codesign (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {114--118},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_15},
  doi          = {10.1007/11542322\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stavridou03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yasinsac03,
  author       = {Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
                  (Discussion)},
  booktitle    = {Security Protocols, 11th International Workshop, Cambridge, UK, April
                  2-4, 2003, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3364},
  pages        = {283--287},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/11542322\_34},
  doi          = {10.1007/11542322\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yasinsac03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArkkoN02,
  author       = {Jari Arkko and
                  Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Weak Authentication: How to Authenticate Unknown Principals without
                  Trusted Parties},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {5--19},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_3},
  doi          = {10.1007/978-3-540-39871-4\_3},
  timestamp    = {Sat, 05 Sep 2020 18:04:37 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArkkoN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Aura02,
  author       = {Tuomas Aura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Mobile IPv6 Security},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_18},
  doi          = {10.1007/978-3-540-39871-4\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Aura02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaB02,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_10},
  doi          = {10.1007/978-3-540-39871-4\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaP02,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Analyzing Delegation Properties},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {120--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_11},
  doi          = {10.1007/978-3-540-39871-4\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson02,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Introduction (Transcript)},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {1},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_1},
  doi          = {10.1007/978-3-540-39871-4\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson02a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Concluding Discussion: Accounting for Resources},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {235--241},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_19},
  doi          = {10.1007/978-3-540-39871-4\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonS02,
  author       = {Bruce Christianson and
                  Jean Fiona Snook},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Shrink-Wrapped Optimism: The {DODA} Approach to Distributed Document
                  Processing},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {74--95},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_8},
  doi          = {10.1007/978-3-540-39871-4\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/EschenauerGB02,
  author       = {Laurent Eschenauer and
                  Virgil D. Gligor and
                  John S. Baras},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On Trust Establishment in Mobile Ad-Hoc Networks},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_6},
  doi          = {10.1007/978-3-540-39871-4\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/EschenauerGB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FirozabadiS02,
  author       = {Babak Sadighi Firozabadi and
                  Marek J. Sergot},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Contractual Access Control},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {96--103},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_9},
  doi          = {10.1007/978-3-540-39871-4\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FirozabadiS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley02,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Supporting Imprecise Delegation in KeyNote},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_15},
  doi          = {10.1007/978-3-540-39871-4\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Foley02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao02,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Structured Operational Modelling of the Dolev-Yao Threat Model},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_5},
  doi          = {10.1007/978-3-540-39871-4\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MitchellP02,
  author       = {Chris J. Mitchell and
                  Paulo S. Pagliusi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Is Entity Authentication Necessary?},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_4},
  doi          = {10.1007/978-3-540-39871-4\_4},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MitchellP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham02,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {2--4},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_2},
  doi          = {10.1007/978-3-540-39871-4\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham02a,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Back to the Beginning},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {242},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_20},
  doi          = {10.1007/978-3-540-39871-4\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NikanderA02,
  author       = {Pekka Nikander and
                  Jari Arkko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Delegation of Signalling Rights},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_17},
  doi          = {10.1007/978-3-540-39871-4\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NikanderA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SasakiYI02,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Hiroshi Yoshiura and
                  Shinji Itoh},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Combinatorial Optimization of Countermeasures against Illegal Copying},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_12},
  doi          = {10.1007/978-3-540-39871-4\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SasakiYI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ValdesACDDLSSU02,
  author       = {Alfonso Valdes and
                  Magnus Almgren and
                  Steven Cheung and
                  Yves Deswarte and
                  Bruno Dutertre and
                  Joshua Levy and
                  Hassen Sa{\"{\i}}di and
                  Victoria Stavridou and
                  Tom{\'{a}}s E. Uribe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {An Architecture for an Adaptive Intrusion-Tolerant Server},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {158--178},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_14},
  doi          = {10.1007/978-3-540-39871-4\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ValdesACDDLSSU02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yahalom02,
  author       = {Raphael Yahalom},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocols with Certified-Transfer Servers},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_13},
  doi          = {10.1007/978-3-540-39871-4\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yahalom02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YasinsacD02,
  author       = {Alec Yasinsac and
                  James A. Davis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modeling Protocols for Secure Group Communications in Ad Hoc Networks:
                  (Extended Abstract)},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_16},
  doi          = {10.1007/978-3-540-39871-4\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YasinsacD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraMITS02,
  author       = {Hiroshi Yoshiura and
                  Kunihiko Miyazaki and
                  Shinji Itoh and
                  Kazuo Takaragi and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Legally Authorized and Unauthorized Digital Evidence},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {67--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_7},
  doi          = {10.1007/978-3-540-39871-4\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraMITS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2001,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45807-7},
  doi          = {10.1007/3-540-45807-7},
  isbn         = {3-540-44263-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AielloBBCIKR01,
  author       = {William Aiello and
                  Steven M. Bellovin and
                  Matt Blaze and
                  Ran Canetti and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Omer Reingold},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_5},
  doi          = {10.1007/3-540-45807-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AielloBBCIKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AuraM01,
  author       = {Tuomas Aura and
                  Silja M{\"{a}}ki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Survivable Security Architecture for Ad-Hoc Networks},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {63--73},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_9},
  doi          = {10.1007/3-540-45807-7\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AuraM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaP01,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Proof of Non-repudiation},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {119--125},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_19},
  doi          = {10.1007/3-540-45807-7\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze01,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {40--48},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_6},
  doi          = {10.1007/3-540-45807-7\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson01,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Merkle Puzzles Revisited (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {91--94},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_14},
  doi          = {10.1007/3-540-45807-7\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson01a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Concluding Discussion: When Does Confidentiality Harm Security?},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {229--238},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_33},
  doi          = {10.1007/3-540-45807-7\_33},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonW01,
  author       = {Bruce Christianson and
                  David Wheeler},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Merkle Puzzles Revisited - Finding Matching Elements Between Lists},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {87--90},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_13},
  doi          = {10.1007/3-540-45807-7\_13},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Drabwell01,
  author       = {Peter Drabwell},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Bluetooth Security - Fact or Fiction? (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {221--228},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_32},
  doi          = {10.1007/3-540-45807-7\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Drabwell01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Firozabadi01,
  author       = {Babak Sadighi Firozabadi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Using Attribute Certificates for Creating Management Structures (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {146--150},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_22},
  doi          = {10.1007/3-540-45807-7\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Firozabadi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FirozabadiSB01,
  author       = {Babak Sadighi Firozabadi and
                  Marek J. Sergot and
                  Olav L. Bandmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Using Authority Certificates to Create Management Structures},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_21},
  doi          = {10.1007/3-540-45807-7\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FirozabadiSB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley01,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Trust Management and Whether to Delegate},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {151--157},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_23},
  doi          = {10.1007/3-540-45807-7\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley01a,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Trust Management and Whether to Delegate (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {158--165},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_24},
  doi          = {10.1007/3-540-45807-7\_24},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor01,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Negotiation of Access Control Policies (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {202--212},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_29},
  doi          = {10.1007/3-540-45807-7\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorKKBB01,
  author       = {Virgil D. Gligor and
                  Himanshu Khurana and
                  Radostina K. Koleva and
                  Vijay G. Bharadwaj and
                  John S. Baras},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On the Negotiation of Access Control Policies},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {188--201},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_28},
  doi          = {10.1007/3-540-45807-7\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorKKBB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann01,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{PIM} Security},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {80--81},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_11},
  doi          = {10.1007/3-540-45807-7\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann01a,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {{PIM} Security (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {82--86},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_12},
  doi          = {10.1007/3-540-45807-7\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jurjens01,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Encapsulating Rules of Prudent Security Engineering},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {95--101},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_15},
  doi          = {10.1007/3-540-45807-7\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jurjens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jurjens01a,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Encapsulating Rules of Prudent Security Engineering (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {102--106},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_16},
  doi          = {10.1007/3-540-45807-7\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jurjens01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas01,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {You Can't Take It with You},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {166--169},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_25},
  doi          = {10.1007/3-540-45807-7\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Maki01,
  author       = {Silja M{\"{a}}ki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {74--79},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_10},
  doi          = {10.1007/3-540-45807-7\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Maki01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham01,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address: Mobile Computing versus Immobile Security},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_1},
  doi          = {10.1007/3-540-45807-7\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nikander01,
  author       = {Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Denial-of-Service, Address Ownership, and Early Authentication in
                  the IPv6 World},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {12--21},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_3},
  doi          = {10.1007/3-540-45807-7\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nikander01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nikander01a,
  author       = {Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Denial of Service, Address Ownership, and Early Authentication in
                  the IPv6 World (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {22--26},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_4},
  doi          = {10.1007/3-540-45807-7\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nikander01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson01,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Proof of Non-repudiation (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {126--133},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_20},
  doi          = {10.1007/3-540-45807-7\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Price01,
  author       = {Geraint Price},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Thwarting Timing Attacks Using {ATM} Networks},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_7},
  doi          = {10.1007/3-540-45807-7\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Price01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Price01a,
  author       = {Geraint Price},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Thwarting Timing Attacks Using {ATM} Networks (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {59--62},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_8},
  doi          = {10.1007/3-540-45807-7\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Price01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe01,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Experiences of Mobile {IP} Security},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {4--11},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_2},
  doi          = {10.1007/3-540-45807-7\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Saidi01,
  author       = {Hassen Sa{\"{\i}}di},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Intrusion-Tolerant Group Management in Enclaves},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {213--216},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_30},
  doi          = {10.1007/3-540-45807-7\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Saidi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Thucydides01,
  author       = {Thucydides},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Last Word},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {239},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_34},
  doi          = {10.1007/3-540-45807-7\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Thucydides01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wheeler01,
  author       = {David Wheeler},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocols Using Keys from Faulty Data},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {170--179},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_26},
  doi          = {10.1007/3-540-45807-7\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wheeler01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wheeler01a,
  author       = {David Wheeler},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocols Using Keys from Faulty Data (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {180--187},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_27},
  doi          = {10.1007/3-540-45807-7\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wheeler01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yoshiura01,
  author       = {Hiroshi Yoshiura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {115--118},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_18},
  doi          = {10.1007/3-540-45807-7\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yoshiura01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraMITS01,
  author       = {Hiroshi Yoshiura and
                  Kunihiko Miyazaki and
                  Shinji Itoh and
                  Kazuo Takaragi and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Multi-OS Approach to Trusted Computer Systems},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {107--114},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_17},
  doi          = {10.1007/3-540-45807-7\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraMITS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/alcolm01,
  author       = {James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Lightweight Authentication in a Mobile Network (Transcript of Discussion)},
  booktitle    = {Security Protocols, 9th International Workshop, Cambridge, UK, April
                  25-27, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2467},
  pages        = {217--220},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45807-7\_31},
  doi          = {10.1007/3-540-45807-7\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/alcolm01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2000,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44810-1},
  doi          = {10.1007/3-540-44810-1},
  isbn         = {3-540-42566-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson00,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {The Correctness of Crypto Transaction Sets},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {125--127},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_17},
  doi          = {10.1007/3-540-44810-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson00a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {The Correctness of Crypto Transaction Sets (Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {128--141},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_18},
  doi          = {10.1007/3-540-44810-1\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Aura00,
  author       = {Tuomas Aura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {178--181},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_23},
  doi          = {10.1007/3-540-44810-1\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Aura00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AuraNL00,
  author       = {Tuomas Aura and
                  Pekka Nikander and
                  Jussipekka Leiwo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {DOS-Resistant Authentication with Client Puzzles},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {170--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_22},
  doi          = {10.1007/3-540-44810-1\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AuraNL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella00,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Lack of Explicitness Strikes Back},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {87--93},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_13},
  doi          = {10.1007/3-540-44810-1\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella00a,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Lack of Explicitness Strikes Back (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {94--99},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_14},
  doi          = {10.1007/3-540-44810-1\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaMPT00,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson and
                  Piero Tramontano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Making Sense of Specifications: The Formalization of {SET}},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {74--81},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_11},
  doi          = {10.1007/3-540-44810-1\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaMPT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze00,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Looking on the Bright Side of Black-Box Cryptography (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {54--61},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_9},
  doi          = {10.1007/3-540-44810-1\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson00,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {184--193},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_25},
  doi          = {10.1007/3-540-44810-1\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonCM00,
  author       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {182--183},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_24},
  doi          = {10.1007/3-540-44810-1\_24},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonCM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Danezis00,
  author       = {George Danezis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {An Anonymous Auction Protocol Using "Money Escrow" (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {223--233},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_29},
  doi          = {10.1007/3-540-44810-1\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Danezis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor00,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Review and Revocation of Access Privileges Distributed with {PKI}
                  Certificates (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {113--124},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_16},
  doi          = {10.1007/3-540-44810-1\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorBI00,
  author       = {Virgil D. Gligor and
                  Matt Blaze and
                  John Ioannidis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Denial of Service - Panel Discussion},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {194--203},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_26},
  doi          = {10.1007/3-540-44810-1\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorBI00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollman00,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Mergers and Principals (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {14--19},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_3},
  doi          = {10.1007/3-540-44810-1\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollman00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann00,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Mergers and Principals},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {5--13},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_2},
  doi          = {10.1007/3-540-44810-1\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ioannidis00,
  author       = {John Ioannidis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Micro-management of Risk in a Trust-Based Billing System (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {142--154},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_19},
  doi          = {10.1007/3-540-44810-1\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ioannidis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KhuranaG00,
  author       = {Himanshu Khurana and
                  Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Review and Revocation of Access Privileges Distributed with {PKI}
                  Certificates},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_15},
  doi          = {10.1007/3-540-44810-1\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KhuranaG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Landrock00,
  author       = {Peter Landrock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Interactive Identification Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {43--48},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_7},
  doi          = {10.1007/3-540-44810-1\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Landrock00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas00,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {I Cannot Tell a Lie (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {253--255},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_33},
  doi          = {10.1007/3-540-44810-1\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao00,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Short Certification of Secure {RSA} Modulus (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {234--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_30},
  doi          = {10.1007/3-540-44810-1\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham00,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Keynote Address: Security Protocols and the Swiss Army Knife (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_1},
  doi          = {10.1007/3-540-44810-1\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nikander00,
  author       = {Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Users and Trust in Cyberspace (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {36--42},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_6},
  doi          = {10.1007/3-540-44810-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nikander00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NikanderK00,
  author       = {Pekka Nikander and
                  Kristiina Karvonen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Users and Trust in Cyberspace},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {24--35},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_5},
  doi          = {10.1007/3-540-44810-1\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NikanderK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson00,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Making Sense of Specifications: The Formalization of {SET} (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {82--86},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_12},
  doi          = {10.1007/3-540-44810-1\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Price00,
  author       = {Geraint Price},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Broadening the Scope of Fault Tolerance within Secure Services},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {155--164},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_20},
  doi          = {10.1007/3-540-44810-1\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Price00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Price00a,
  author       = {Geraint Price},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Broadening the Scope of Fault Tolerance within Secure Services (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {165--169},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_21},
  doi          = {10.1007/3-540-44810-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Price00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe00,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Authentication and Naming (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {20--23},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_4},
  doi          = {10.1007/3-540-44810-1\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RoeAHL00,
  author       = {Michael Roe and
                  Ross J. Anderson and
                  William S. Harbison and
                  T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Government Access to Keys - Panel Discussion},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {62--73},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_10},
  doi          = {10.1007/3-540-44810-1\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RoeAHL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan00,
  author       = {Peter Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Open Questions (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {49--53},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_8},
  doi          = {10.1007/3-540-44810-1\_8},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano00,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {The Resurrecting Duckling - What Next?},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {204--214},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_27},
  doi          = {10.1007/3-540-44810-1\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano00a,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {The Resurrecting Duckling - What Next? (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {215--222},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_28},
  doi          = {10.1007/3-540-44810-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/X00,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Afterward},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {256},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_34},
  doi          = {10.1007/3-540-44810-1\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/X00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yoshiura00,
  author       = {Hiroshi Yoshiura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Authentication Web-Based Virtual Shops Using Signature-Embedded Marks
                  - {A} Practical Analysis (Transcript of Discussion)},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {249--252},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_32},
  doi          = {10.1007/3-540-44810-1\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yoshiura00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraSSSTKTS00,
  author       = {Hiroshi Yoshiura and
                  Takaaki Shigematsu and
                  Seiichi Susaki and
                  Tsukasa Saitoh and
                  Hisashi Toyoshima and
                  Chikako Kurita and
                  Satoru Tezuka and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  Michael Roe},
  title        = {Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks
                  - {A} Practical Analysis},
  booktitle    = {Security Protocols, 8th International Workshop, Cambridge, UK, April
                  3-5, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2133},
  pages        = {238--248},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44810-1\_31},
  doi          = {10.1007/3-540-44810-1\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraSSSTKTS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1999,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10720107},
  doi          = {10.1007/10720107},
  isbn         = {3-540-67381-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ahlberg99,
  author       = {Allan Ahlberg},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Who Knows?},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {228},
  publisher    = {Springer},
  year         = {1999},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ahlberg99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonL99,
  author       = {Ross J. Anderson and
                  Jong{-}Hyeon Lee},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Jikzi: {A} New Framework for Secure Publishing},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {21--47},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_4},
  doi          = {10.1007/10720107\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella99,
  author       = {Giampaolo Bella},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modelling Agents' Knowledge Inductively},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {85--94},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_12},
  doi          = {10.1007/10720107\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BergadanoCC99,
  author       = {Francesco Bergadano and
                  Davide Cavagnino and
                  Bruno Crispo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Issues in Multicast Security},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {119--139},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_18},
  doi          = {10.1007/10720107\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BergadanoCC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeIK99,
  author       = {Matt Blaze and
                  John Ioannidis and
                  Angelos D. Keromytis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Trust Management and Network Layer Security Protocols},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_16},
  doi          = {10.1007/10720107\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeIK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson99,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Auditing against Impossible Abstractions},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {60--64},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_8},
  doi          = {10.1007/10720107\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonMR99,
  author       = {Bruce Christianson and
                  James A. Malcolm and
                  Brian L. Robinson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Pictures Can't Lie under Oath},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {208--218},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_28},
  doi          = {10.1007/10720107\_28},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonMR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FirozabadiS99,
  author       = {Babak Sadighi Firozabadi and
                  Marek J. Sergot},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Power and Permission in Security Systems},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {48--59},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_6},
  doi          = {10.1007/10720107\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FirozabadiS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorD99,
  author       = {Virgil D. Gligor and
                  Pompiliu Donescu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Integrity-Aware {PCBC} Encryption Schemes},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {153--171},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_22},
  doi          = {10.1007/10720107\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann99,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {What Is Authentication?},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {65--72},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_9},
  doi          = {10.1007/10720107\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lee99,
  author       = {E. Stewart Lee},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Composing Security Properties},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {6--14},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_2},
  doi          = {10.1007/10720107\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lee99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas99,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Auditing against Multiple Policies},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {15--20},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_3},
  doi          = {10.1007/10720107\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao99,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Time-Lock Puzzle with Examinable Evidence of Unlocking Time},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {95--102},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_14},
  doi          = {10.1007/10720107\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Morris99,
  author       = {Robert H. Morris Sr.},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Bob versus Bob - Good Guy/Bad Guy},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {219--227},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_30},
  doi          = {10.1007/10720107\_30},
  timestamp    = {Tue, 24 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Morris99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham99,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address: The Changing Environment},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_1},
  doi          = {10.1007/10720107\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson99,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Relatios Between Secrets: The Yahalom Protocol},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {73--84},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_10},
  doi          = {10.1007/10720107\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe99,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Performance of Protocols},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {140--152},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_20},
  doi          = {10.1007/10720107\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StajanoA99,
  author       = {Frank Stajano and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {172--194},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_24},
  doi          = {10.1007/10720107\_24},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StajanoA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraSNSTST99,
  author       = {Hiroshi Yoshiura and
                  Seiichi Susaki and
                  Yasuhiko Nagai and
                  Tsukasa Saitoh and
                  Hisashi Toyoshima and
                  Ry{\^{o}}ichi Sasaki and
                  Satoru Tezuka},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber
                  Worlds},
  booktitle    = {Security Protocols, 7th International Workshop, Cambridge, UK, April
                  19-21, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1796},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720107\_26},
  doi          = {10.1007/10720107\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraSNSTST99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1998,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49135-X},
  doi          = {10.1007/3-540-49135-X},
  isbn         = {3-540-65663-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anonymous98,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Discussion Session - Trust Management},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {64--63},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_10},
  doi          = {10.1007/3-540-49135-X\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anonymous98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bergadano98,
  author       = {Francesco Bergadano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Third Party Certification of {HTTP} Service Access Statistics (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {100--107},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_16},
  doi          = {10.1007/3-540-49135-X\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bergadano98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BergadanoM98,
  author       = {Francesco Bergadano and
                  P. De Mauro},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Third Party Certification of {HTTP} Service Access Statistics (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {95--99},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_15},
  doi          = {10.1007/3-540-49135-X\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BergadanoM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeFK98,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Angelos D. Keromytis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {KeyNote: Trust Management for Public-Key Infrastructures (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {59--63},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_9},
  doi          = {10.1007/3-540-49135-X\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeFK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson98,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation and Not-So Smart Card (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {158--167},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_24},
  doi          = {10.1007/3-540-49135-X\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonM98,
  author       = {Bruce Christianson and
                  James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation and Not-So Smart Cards (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {154--157},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_23},
  doi          = {10.1007/3-540-49135-X\_23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Crispo98,
  author       = {Bruno Crispo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation of Responsibility (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {118--124},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_18},
  doi          = {10.1007/3-540-49135-X\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Crispo98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Crispo98a,
  author       = {Bruno Crispo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation of Responsibility (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {125--130},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_19},
  doi          = {10.1007/3-540-49135-X\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Crispo98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ellison98,
  author       = {Carl M. Ellison},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {The Trust Shell Game (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {36--40},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_5},
  doi          = {10.1007/3-540-49135-X\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ellison98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ellison98a,
  author       = {Carl M. Ellison},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {The Trust Shell Game (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {41--44},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_6},
  doi          = {10.1007/3-540-49135-X\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ellison98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum98,
  author       = {Joan Feigenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Overview of the AT{\&}T Labs Trust-Management Project (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {45--50},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_7},
  doi          = {10.1007/3-540-49135-X\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Feigenbaum98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum98a,
  author       = {Joan Feigenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Overview of the AT{\&}T Labs Trust-Management Project (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {51--58},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_8},
  doi          = {10.1007/3-540-49135-X\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Feigenbaum98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley98,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {External Consistency and the Verification of Security Protocols (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {24--27},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_3},
  doi          = {10.1007/3-540-49135-X\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley98a,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {External Consistency and the Verification of Security Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {28--35},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_4},
  doi          = {10.1007/3-540-49135-X\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor98,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Application-Oriented Security Policies and Their Composition (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {75--82},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_12},
  doi          = {10.1007/3-540-49135-X\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorG98,
  author       = {Virgil D. Gligor and
                  Serban I. Gavrila},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Application-Oriented Security Policies and Their Composition (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {67--74},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_11},
  doi          = {10.1007/3-540-49135-X\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorLLYW98,
  author       = {Virgil D. Gligor and
                  Peter Landrock and
                  T. Mark A. Lomas and
                  Raphael Yahalom and
                  John P. Warne},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Discussion Session: Differences Between Academic and Commercial Security},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_26},
  doi          = {10.1007/3-540-49135-X\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorLLYW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann98,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Insider Fraud (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {213--219},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_29},
  doi          = {10.1007/3-540-49135-X\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann98a,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Insider Fraud (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {220--226},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_30},
  doi          = {10.1007/3-540-49135-X\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Harbison98,
  author       = {William S. Harbison},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegating Trust (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {108--117},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_17},
  doi          = {10.1007/3-540-49135-X\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Harbison98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Landrock98,
  author       = {Peter Landrock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {A New Concept in Protocols: Verifiable Computational Delegation (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {137--145},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_21},
  doi          = {10.1007/3-540-49135-X\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Landrock98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Landrock98a,
  author       = {Peter Landrock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {A New Concept in Protocols: Verifiable Computational Delegation (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {146--153},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_22},
  doi          = {10.1007/3-540-49135-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Landrock98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas98,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Abuse of Process (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {131--136},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_20},
  doi          = {10.1007/3-540-49135-X\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NeedhamLFGC98,
  author       = {Roger M. Needham and
                  E. Stewart Lee and
                  Joan Feigenbaum and
                  Virgil D. Gligor and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Panel Session - Future Directions},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {227--239},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_31},
  doi          = {10.1007/3-540-49135-X\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NeedhamLFGC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson98,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Inductive Analysis of the Internet Protocol {TLS} (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_1},
  doi          = {10.1007/3-540-49135-X\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson98a,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Inductive Analysis of the Internet Protocol {TLS} (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_2},
  doi          = {10.1007/3-540-49135-X\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe98,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Certification and Delegation (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {168--176},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_25},
  doi          = {10.1007/3-540-49135-X\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Sasaki98,
  author       = {Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Secure Fingerprinting Using Public-Key Cryptography (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {90--94},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_14},
  doi          = {10.1007/3-540-49135-X\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Sasaki98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yahalom98,
  author       = {Raphael Yahalom},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Optimistic Trust with Realistic \emph{e}Nvestigators (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {193--202},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_27},
  doi          = {10.1007/3-540-49135-X\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yahalom98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yahalom98a,
  author       = {Raphael Yahalom},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Optimistic Trust with Realistic \emph{e}Nvestigators (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_28},
  doi          = {10.1007/3-540-49135-X\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yahalom98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraST98,
  author       = {Hiroshi Yoshiura and
                  Ry{\^{o}}ichi Sasaki and
                  Kazuo Takaragi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Secure Fingerprinting Using Public-Key Cryptography (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {83--89},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_13},
  doi          = {10.1007/3-540-49135-X\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1997,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0028154},
  doi          = {10.1007/BFB0028154},
  isbn         = {3-540-64040-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonK97,
  author       = {Ross J. Anderson and
                  Markus G. Kuhn},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Low Cost Attacks on Tamper Resistant Devices},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028165},
  doi          = {10.1007/BFB0028165},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonMPBH97,
  author       = {Ross J. Anderson and
                  V{\'{a}}clav Maty{\'{a}}s Jr. and
                  Fabien A. P. Petitcolas and
                  Iain E. Buchan and
                  Rudolf Hanka},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Secure Books: Protecting the Distribution of Knowledge},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028155},
  doi          = {10.1007/BFB0028155},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonMPBH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaoDHJNN97,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Yongfei Han and
                  Albert B. Jeng and
                  Arcot Desai Narasimhalu and
                  Teow{-}Hin Ngair},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Breaking Public Key Cryptosystems on Tamper Resistant Devices in the
                  Presence of Transient Faults},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {115--124},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028164},
  doi          = {10.1007/BFB0028164},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaoDHJNN97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blake-WilsonM97,
  author       = {Simon Blake{-}Wilson and
                  Alfred Menezes},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Entity Authentication and Authenticated Key Transport Protocols Employing
                  Asymmetric Techniques},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {137--158},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028166},
  doi          = {10.1007/BFB0028166},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blake-WilsonM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonM97,
  author       = {Bruce Christianson and
                  James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Binding Bit Patterns to Real World Entities},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {105--113},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028163},
  doi          = {10.1007/BFB0028163},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Crispo97,
  author       = {Bruno Crispo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {How to Build Evidence in a Public-Key Infrastructure for Multi-domain
                  Environments},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {53--65},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028159},
  doi          = {10.1007/BFB0028159},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Crispo97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gurgens97,
  author       = {Sigrid G{\"{u}}rgens},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {{SG} Logic- {A} Formal Analysis Technique for Authentication Protocols},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {159--176},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028167},
  doi          = {10.1007/BFB0028167},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gurgens97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KelseySW97,
  author       = {John Kelsey and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Protocol Interactions and the Chosen Protocol Attack},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028162},
  doi          = {10.1007/BFB0028162},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/KelseySW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kiefer97,
  author       = {Klaus Kiefer},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {A Weakness of the Menezes-Vanstone Cryptosystem},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {201--206},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028170},
  doi          = {10.1007/BFB0028170},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kiefer97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lucks97,
  author       = {Stefan Lucks},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting
                  Public Keys},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {79--90},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028161},
  doi          = {10.1007/BFB0028161},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lucks97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Okamoto97,
  author       = {Tatsuaki Okamoto},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Receipt-Free Electronic Voting Schemes for Large Scale Elections},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {25--35},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028157},
  doi          = {10.1007/BFB0028157},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Okamoto97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Okamoto97a,
  author       = {Tatsuaki Okamoto},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Threshold Key-Recovery Systems for {RSA}},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028169},
  doi          = {10.1007/BFB0028169},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Okamoto97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paillier97,
  author       = {Pascal Paillier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {On Ideal Non-perfect Secret Sharing Schemes},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {207--216},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028171},
  doi          = {10.1007/BFB0028171},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paillier97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Petersen97,
  author       = {Holger Petersen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {How to Convert any Digital Signature Scheme into a Group Signature
                  Scheme},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {177--190},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028168},
  doi          = {10.1007/BFB0028168},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Petersen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PetersenM97,
  author       = {Holger Petersen and
                  Markus Michels},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {On Signature Schemes with Threshold Verification Detecting Malicious
                  Verifiers},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028160},
  doi          = {10.1007/BFB0028160},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/PetersenM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ReedSG97,
  author       = {Michael G. Reed and
                  Paul F. Syverson and
                  David M. Goldschlag},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Protocols Using Anonymous Connections: Mobile Applications},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028156},
  doi          = {10.1007/BFB0028156},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ReedSG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SolanaH97,
  author       = {Eduardo Solana and
                  J{\"{u}}rgen Harms},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  T. Mark A. Lomas and
                  Michael Roe},
  title        = {Flexible Internet Secure Transactions Based on Collaborative Domains},
  booktitle    = {Security Protocols, 5th International Workshop, Paris, France, April
                  7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1361},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028158},
  doi          = {10.1007/BFB0028158},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SolanaH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/1996,
  editor       = {T. Mark A. Lomas},
  title        = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-62494-5},
  doi          = {10.1007/3-540-62494-5},
  isbn         = {3-540-62494-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonMS96,
  author       = {Ross J. Anderson and
                  Charalampos Manifavas and
                  Chris Sutherland},
  editor       = {T. Mark A. Lomas},
  title        = {NetCard - {A} Practical Electronic-Cash System},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {49--57},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_4},
  doi          = {10.1007/3-540-62494-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonMS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterD96,
  author       = {Mike Burmester and
                  Yvo Desmedt},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Secure Conference-Key Distribution},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {119--129},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_12},
  doi          = {10.1007/3-540-62494-5\_12},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenGM96,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell},
  editor       = {T. Mark A. Lomas},
  title        = {Key Escrow in Mutually Mistrusting Domains},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {139--153},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_14},
  doi          = {10.1007/3-540-62494-5\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChenGM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonH96,
  author       = {Bruce Christianson and
                  William S. Harbison},
  editor       = {T. Mark A. Lomas},
  title        = {Why Isn't Trust Transitive?},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {171--176},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_16},
  doi          = {10.1007/3-540-62494-5\_16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChuangG96,
  author       = {Shaw{-}Cheng Chuang and
                  David J. Greaves},
  editor       = {T. Mark A. Lomas},
  title        = {Securing the Residential Asynchronous Transfer Mode Networks},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {177--196},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_17},
  doi          = {10.1007/3-540-62494-5\_17},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChuangG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CramerDP96,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Torben P. Pedersen},
  editor       = {T. Mark A. Lomas},
  title        = {Efficient and Provable Security Amplifications},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_9},
  doi          = {10.1007/3-540-62494-5\_9},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CramerDP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/CrispoL96,
  author       = {Bruno Crispo and
                  T. Mark A. Lomas},
  editor       = {T. Mark A. Lomas},
  title        = {A Certification Scheme for Electronic Commerce},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_2},
  doi          = {10.1007/3-540-62494-5\_2},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/CrispoL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Cusick96,
  author       = {Thomas W. Cusick},
  editor       = {T. Mark A. Lomas},
  title        = {A Comparison of {RSA} and the Naccache-Stern Public-Key Cryptosystem},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {111--116},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_10},
  doi          = {10.1007/3-540-62494-5\_10},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Cusick96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FujisakiO96,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto},
  editor       = {T. Mark A. Lomas},
  title        = {Practical Escrow Cash System},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_3},
  doi          = {10.1007/3-540-62494-5\_3},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FujisakiO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JoyeQ96,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  editor       = {T. Mark A. Lomas},
  title        = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and
                  Elliptic Curves},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {93--100},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_8},
  doi          = {10.1007/3-540-62494-5\_8},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/JoyeQ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kaliski96,
  author       = {Burton S. Kaliski Jr.},
  editor       = {T. Mark A. Lomas},
  title        = {{IEEE} {P1363:} {A} Standard for RSA, Diffie-Hellman, and Elliptic-Curve
                  Cryptography (Abstract)},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {117--118},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_11},
  doi          = {10.1007/3-540-62494-5\_11},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kaliski96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LimL96,
  author       = {Chae Hoon Lim and
                  Pil Joong Lee},
  editor       = {T. Mark A. Lomas},
  title        = {Directed Signatures and Application to Threshold Cryptosystems},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {131--138},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_13},
  doi          = {10.1007/3-540-62494-5\_13},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LimL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao96,
  author       = {Wenbo Mao},
  editor       = {T. Mark A. Lomas},
  title        = {On Cryptographic Techniques for On-line Bankcard Payment Transactions
                  Using Open Networks},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_1},
  doi          = {10.1007/3-540-62494-5\_1},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NaorS96,
  author       = {Moni Naor and
                  Adi Shamir},
  editor       = {T. Mark A. Lomas},
  title        = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {197--202},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_18},
  doi          = {10.1007/3-540-62494-5\_18},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NaorS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Pedersen96,
  author       = {Torben P. Pedersen},
  editor       = {T. Mark A. Lomas},
  title        = {Electronic Payments of Small Amounts},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {59--68},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_5},
  doi          = {10.1007/3-540-62494-5\_5},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Pedersen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RivestS96,
  author       = {Ronald L. Rivest and
                  Adi Shamir},
  editor       = {T. Mark A. Lomas},
  title        = {PayWord and MicroMint: Two Simple Micropayment Schemes},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {69--87},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_6},
  doi          = {10.1007/3-540-62494-5\_6},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RivestS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SchneierK96,
  author       = {Bruce Schneier and
                  John Kelsey},
  editor       = {T. Mark A. Lomas},
  title        = {Automatic Event-Stream Notarization Using Digital Signatures},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_15},
  doi          = {10.1007/3-540-62494-5\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/SchneierK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wheeler96,
  author       = {David Wheeler},
  editor       = {T. Mark A. Lomas},
  title        = {Transactions Using Bets},
  booktitle    = {Security Protocols, International Workshop, Cambridge, United Kingdom,
                  April 10-12, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1189},
  pages        = {89--92},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-62494-5\_7},
  doi          = {10.1007/3-540-62494-5\_7},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wheeler96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics