Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/spw:"
@inproceedings{DBLP:conf/spw/AndersonB23, author = {Ross J. Anderson and Nicholas Boucher}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {199--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_19}, doi = {10.1007/978-3-031-43033-6\_19}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonB23a, author = {Ross J. Anderson and Nicholas Boucher}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {205--210}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_20}, doi = {10.1007/978-3-031-43033-6\_20}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonB23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blessing23, author = {Jenny Blessing}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {193--198}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_18}, doi = {10.1007/978-3-031-43033-6\_18}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blessing23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlessingA23, author = {Jenny Blessing and Ross Anderson}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {One Protocol to Rule Them All? On Securing Interoperable Messaging}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {174--192}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_17}, doi = {10.1007/978-3-031-43033-6\_17}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlessingA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlessingCSAGR23, author = {Jenny Blessing and Partha Das Chowdhury and Maria Sameen and Ross J. Anderson and Joseph Gardiner and Awais Rashid}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Towards Human-Centric Endpoint Security}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {211--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_21}, doi = {10.1007/978-3-031-43033-6\_21}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlessingCSAGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BozorgiA23, author = {Arastoo Bozorgi and Jonathan Anderson}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Blind Auditing and Probabilistic Access Controls}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {257--269}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_25}, doi = {10.1007/978-3-031-43033-6\_25}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BozorgiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chowdhury23, author = {Partha Das Chowdhury}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Towards Human-Centric Endpoint Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {220--227}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_22}, doi = {10.1007/978-3-031-43033-6\_22}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chowdhury23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonS23, author = {Bruce Christianson and Alex Shafarenko}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Transporting a Secret Using Destructively-Read Memory}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {32--37}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_3}, doi = {10.1007/978-3-031-43033-6\_3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorPB23, author = {Virgil D. Gligor and Adrian Perrig and David A. Basin}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Determining an Economic Value of High Assurance for Commodity Software Security}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {228--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_23}, doi = {10.1007/978-3-031-43033-6\_23}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gloor23, author = {Christelle Gloor}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Trusted Introductions for Secure Messaging (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {136--148}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_14}, doi = {10.1007/978-3-031-43033-6\_14}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gloor23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GloorP23, author = {Christelle Gloor and Adrian Perrig}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Trusted Introductions for Secure Messaging}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {123--135}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_13}, doi = {10.1007/978-3-031-43033-6\_13}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GloorP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Halpin23, author = {Harry Halpin}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {70--77}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_8}, doi = {10.1007/978-3-031-43033-6\_8}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Halpin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HalpinS23, author = {Harry Halpin and Andrei Serjantov}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Incentives and Censorship Resistance for Mixnets Revisited}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {64--69}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_7}, doi = {10.1007/978-3-031-43033-6\_7}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HalpinS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hugenroth23, author = {Daniel Hugenroth}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {162--173}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_16}, doi = {10.1007/978-3-031-43033-6\_16}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hugenroth23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HugenrothKB23, author = {Daniel Hugenroth and Ceren Kocaogullar and Alastair R. Beresford}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Choosing Your Friends: Shaping Ethical Use of Anonymity Networks}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {151--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_15}, doi = {10.1007/978-3-031-43033-6\_15}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HugenrothKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kruzikova23, author = {Agata Kruzikova}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Authentication of {IT} Professionals in the Wild - {A} Survey (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {57--63}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_6}, doi = {10.1007/978-3-031-43033-6\_6}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kruzikova23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KruzikovaMB23, author = {Agata Kruzikova and Vashek Matyas and Milan Broz}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Authentication of {IT} Professionals in the Wild - {A} Survey}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {43--56}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_5}, doi = {10.1007/978-3-031-43033-6\_5}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KruzikovaMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Monteith23, author = {Jessica Monteith}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Who Is Benefiting from Your Fitness Data? {A} Privacy Analysis of Smartwatches (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {113--122}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_12}, doi = {10.1007/978-3-031-43033-6\_12}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Monteith23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MonteithSTD23, author = {Jessica Monteith and Oliver Shapcott and Anna Talas and Pranav Dahiya}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Who Is Benefiting from Your Fitness Data? {A} Privacy Analysis of Smartwatches}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {97--112}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_11}, doi = {10.1007/978-3-031-43033-6\_11}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/MonteithSTD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Perrig23, author = {Adrian Perrig}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {243--256}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_24}, doi = {10.1007/978-3-031-43033-6\_24}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Perrig23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Shafarenko23, author = {Alex Shafarenko}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {38--42}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_4}, doi = {10.1007/978-3-031-43033-6\_4}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Shafarenko23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano23, author = {Frank Stajano}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {3--19}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_1}, doi = {10.1007/978-3-031-43033-6\_1}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano23a, author = {Frank Stajano}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {20--31}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_2}, doi = {10.1007/978-3-031-43033-6\_2}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Turk23, author = {Kieron Ivy Turk}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion)}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {89--96}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_10}, doi = {10.1007/978-3-031-43033-6\_10}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Turk23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/TurkHB23, author = {Kieron Ivy Turk and Alice Hutchings and Alastair R. Beresford}, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices}, booktitle = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, pages = {78--88}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6\_9}, doi = {10.1007/978-3-031-43033-6\_9}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/TurkHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2023, editor = {Frank Stajano and Vashek Maty{\'{a}}s and Bruce Christianson and Jonathan Anderson}, title = {Security Protocols {XXVIII} - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14186}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43033-6}, doi = {10.1007/978-3-031-43033-6}, isbn = {978-3-031-43032-9}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2019, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57043-9}, doi = {10.1007/978-3-030-57043-9}, isbn = {978-3-030-57042-2}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ahmed-RengersAH19, author = {Mansoor Ahmed{-}Rengers and Ross J. Anderson and Darija Halatova and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Snitches Get Stitches: On the Difficulty of Whistleblowing}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {289--303}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_27}, doi = {10.1007/978-3-030-57043-9\_27}, timestamp = {Mon, 24 Aug 2020 16:33:11 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ahmed-RengersAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ahmed-RengersAH19a, author = {Mansoor Ahmed{-}Rengers and Ross J. Anderson and Darija Halatova and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {304--312}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_28}, doi = {10.1007/978-3-030-57043-9\_28}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ahmed-RengersAH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anantharaman19, author = {Prashant Anantharaman}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Mismorphism: The Heart of the Weird Machine (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {125--131}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_12}, doi = {10.1007/978-3-030-57043-9\_12}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anantharaman19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AnantharamanKBJ19, author = {Prashant Anantharaman and Vijay H. Kothari and J. Peter Brady and Ira Ray Jenkins and Sameed Ali and Michael C. Millian and Ross Koppel and Jim Blythe and Sergey Bratus and Sean W. Smith}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Mismorphism: The Heart of the Weird Machine}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {113--124}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_11}, doi = {10.1007/978-3-030-57043-9\_11}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AnantharamanKBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BozorgiJA19, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Challenges in Designing a Distributed Cryptographic File System}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {177--192}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_17}, doi = {10.1007/978-3-030-57043-9\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BozorgiJA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BozorgiJA19a, author = {Arastoo Bozorgi and Mahya Soleimani Jadidi and Jonathan Anderson}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {193--199}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_18}, doi = {10.1007/978-3-030-57043-9\_18}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BozorgiJA19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chuat19, author = {Laurent Chuat}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {213--222}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_20}, doi = {10.1007/978-3-030-57043-9\_20}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chuat19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChuatPP19, author = {Laurent Chuat and Sarah Plocher and Adrian Perrig}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {203--212}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_19}, doi = {10.1007/978-3-030-57043-9\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ChuatPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyR19, author = {Simon N. Foley and Vivien M. Rooney}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Social Constructionism in Security Protocols - {A} Position on Human Experience, Psychology and Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {69--81}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_7}, doi = {10.1007/978-3-030-57043-9\_7}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyR19a, author = {Simon N. Foley and Vivien M. Rooney}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Social Constructionism in Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {82--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_8}, doi = {10.1007/978-3-030-57043-9\_8}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FrioloMN019, author = {Daniele Friolo and Fabio Massacci and Chan Nam Ngo and Daniele Venturi}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {135--147}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_13}, doi = {10.1007/978-3-030-57043-9\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FrioloMN019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor19, author = {Virgil D. Gligor}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Rest Stop on the Unending Road to Provable Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {223--232}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_21}, doi = {10.1007/978-3-030-57043-9\_21}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor19a, author = {Virgil D. Gligor}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {233--241}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_22}, doi = {10.1007/978-3-030-57043-9\_22}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HicksM19, author = {Alexander Hicks and Steven J. Murdoch}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Transparency Enhancing Technologies to Make Security Protocols Work for Humans}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {3--10}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_1}, doi = {10.1007/978-3-030-57043-9\_1}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HicksM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KothariAJMBABBK19, author = {Vijay H. Kothari and Prashant Anantharaman and Ira Ray Jenkins and Michael C. Millian and J. Peter Brady and Sameed Ali and Sergey Bratus and Jim Blythe and Ross Koppel and Sean W. Smith}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Human-Computability Boundaries}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {157--166}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_15}, doi = {10.1007/978-3-030-57043-9\_15}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KothariAJMBABBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KothariM19, author = {Vijay Kothari and Michael C. Millian}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Human-Computability Boundaries (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {167--174}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_16}, doi = {10.1007/978-3-030-57043-9\_16}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KothariM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kraus19, author = {Lydia Kraus}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Evolution of {SSL/TLS} Indicators and Warnings in Web Browsers (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {281--288}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_26}, doi = {10.1007/978-3-030-57043-9\_26}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kraus19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KrausUMF19, author = {Lydia Kraus and Martin Ukrop and Vashek Matyas and Tobias Fiebig}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Evolution of {SSL/TLS} Indicators and Warnings in Web Browsers}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {267--280}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_25}, doi = {10.1007/978-3-030-57043-9\_25}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KrausUMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19, author = {Vasilios Mavroudis}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {91--103}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_9}, doi = {10.1007/978-3-030-57043-9\_9}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19a, author = {Vasilios Mavroudis}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {104--112}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_10}, doi = {10.1007/978-3-030-57043-9\_10}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murdoch19, author = {Steven J. Murdoch}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {11--19}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_2}, doi = {10.1007/978-3-030-57043-9\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murdoch19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ngo19, author = {Chan Nam Ngo}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Affordable Security or Big Guy vs Small Guy (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {148--156}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_14}, doi = {10.1007/978-3-030-57043-9\_14}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ngo19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Radomirovic19, author = {Sasa Radomirovic}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Shaping Our Mental Model of Security}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {51--59}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_5}, doi = {10.1007/978-3-030-57043-9\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Radomirovic19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Radomirovic19a, author = {Sasa Radomirovic}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Shaping Our Mental Model of Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {60--68}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_6}, doi = {10.1007/978-3-030-57043-9\_6}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Radomirovic19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ReinheimerIS19, author = {Benjamin Maximilian Reinheimer and Fairooz Islam and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Audio {CAPTCHA} with a Few Cocktails: It's so Noisy {I} Can't Hear You}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {20--40}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_3}, doi = {10.1007/978-3-030-57043-9\_3}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ReinheimerIS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ReinheimerIS19a, author = {Benjamin Maximilian Reinheimer and Fairooz Islam and Ilia Shumailov}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Audio {CAPTCHA} with a Few Cocktails: It's So Noisy {I} Can't Hear You (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {41--47}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_4}, doi = {10.1007/978-3-030-57043-9\_4}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ReinheimerIS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Vasile19, author = {Diana A. Vasile}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {258--263}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_24}, doi = {10.1007/978-3-030-57043-9\_24}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Vasile19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VasileKTB19, author = {Diana A. Vasile and Martin Kleppmann and Daniel R. Thomas and Alastair R. Beresford}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Ghost Trace on the Wire? Using Key Evidence for Informed Decisions}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {245--257}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_23}, doi = {10.1007/978-3-030-57043-9\_23}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VasileKTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson18, author = {Ross Anderson}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Making Bitcoin Legal (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {254--265}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_30}, doi = {10.1007/978-3-030-03251-7\_30}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonSA18, author = {Ross Anderson and Ilia Shumailov and Mansoor Ahmed{-}Rengers}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Making Bitcoin Legal}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {243--253}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_29}, doi = {10.1007/978-3-030-03251-7\_29}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtwaterG18, author = {Erinn Atwater and Ian Goldberg}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {289--294}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_33}, doi = {10.1007/978-3-030-03251-7\_33}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AtwaterG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtwaterG18a, author = {Erinn Atwater and Ian Goldberg}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {295--303}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_34}, doi = {10.1007/978-3-030-03251-7\_34}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AtwaterG18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AzouviHM18, author = {Sarah Azouvi and Alexander Hicks and Steven J. Murdoch}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Incentives in Security Protocols}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {132--141}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_15}, doi = {10.1007/978-3-030-03251-7\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AzouviHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BecerraRRS18, author = {Jos{\'{e}} Becerra and Peter B. R{\o}nne and Peter Y. A. Ryan and Petra Sala}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {HoneyPAKEs}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {63--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_7}, doi = {10.1007/978-3-030-03251-7\_7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/BecerraRRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dumitras18, author = {Tudor Dumitras}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {163--165}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_18}, doi = {10.1007/978-3-030-03251-7\_18}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Dumitras18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/DumitrasKMS18, author = {Tudor Dumitras and Yigitcan Kaya and Radu Marginean and Octavian Suciu}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine Learning System}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {150--162}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_17}, doi = {10.1007/978-3-030-03251-7\_17}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/DumitrasKMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumW18, author = {Joan Feigenbaum and Daniel J. Weitzner}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {266--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_31}, doi = {10.1007/978-3-030-03251-7\_31}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor18, author = {Virgil D. Gligor}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Requirements for Root of Trust Establishment (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {203--208}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_24}, doi = {10.1007/978-3-030-03251-7\_24}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Gligor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorW18, author = {Virgil D. Gligor and Maverick Woo}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Requirements for Root of Trust Establishment}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {192--202}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_23}, doi = {10.1007/978-3-030-03251-7\_23}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/GligorW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kleppmann18, author = {Martin Kleppmann}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {From Secure Messaging to Secure Collaboration (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {186--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_22}, doi = {10.1007/978-3-030-03251-7\_22}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Kleppmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KleppmannKVB18, author = {Martin Kleppmann and Stephan A. Kollmann and Diana A. Vasile and Alastair R. Beresford}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {From Secure Messaging to Secure Collaboration}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {179--185}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_21}, doi = {10.1007/978-3-030-03251-7\_21}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KleppmannKVB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Krol18, author = {Kat Krol}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Intentionality and Agency in Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {126--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_14}, doi = {10.1007/978-3-030-03251-7\_14}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Krol18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KrolLADS18, author = {Kat Krol and David Llewellyn{-}Jones and Seb Aebischer and Claudio Dettoni and Frank Stajano}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Intentionality and Agency in Security}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {114--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_13}, doi = {10.1007/978-3-030-03251-7\_13}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KrolLADS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Li18, author = {Wanpeng Li}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {42--44}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_4}, doi = {10.1007/978-3-030-03251-7\_4}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Li18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LiMC18, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {24--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_3}, doi = {10.1007/978-3-030-03251-7\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LiMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas18, author = {T. Mark A. Lomas}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {User Authentication for the Internet of Things (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {214--224}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_26}, doi = {10.1007/978-3-030-03251-7\_26}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Lomas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MartimianoM18, author = {Taciane Martimiano and Jean Everson Martina}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {96--105}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_11}, doi = {10.1007/978-3-030-03251-7\_11}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/MartimianoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Martina18, author = {Jean Everson Martina}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {106--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_12}, doi = {10.1007/978-3-030-03251-7\_12}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Martina18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Massacci18, author = {Fabio Massacci}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {55--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_6}, doi = {10.1007/978-3-030-03251-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Massacci18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciN0W18, author = {Fabio Massacci and Chan Nam Ngo and Daniele Venturi and Julian Williams}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {45--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_5}, doi = {10.1007/978-3-030-03251-7\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/McCorry18, author = {Patrick McCorry}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {234--242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_28}, doi = {10.1007/978-3-030-03251-7\_28}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/McCorry18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/McCorryMA18, author = {Patrick McCorry and Malte M{\"{o}}ser and Syed Taha Ali}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {225--233}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_27}, doi = {10.1007/978-3-030-03251-7\_27}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/McCorryMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murdoch18, author = {Steven J. Murdoch}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Incentives in Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {142--149}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_16}, doi = {10.1007/978-3-030-03251-7\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murdoch18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nemec18, author = {Lukas Nemec}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {93--95}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_10}, doi = {10.1007/978-3-030-03251-7\_10}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Nemec18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NemecOMS18, author = {Lukas Nemec and Radim Ost{\'{a}}dal and Vashek Matyas and Petr Svenda}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {84--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_9}, doi = {10.1007/978-3-030-03251-7\_9}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/NemecOMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan18, author = {Peter Y. A. Ryan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {HoneyPAKEs (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {78--83}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_8}, doi = {10.1007/978-3-030-03251-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Rymer18, author = {Graham Rymer}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {15--23}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_2}, doi = {10.1007/978-3-030-03251-7\_2}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Rymer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RymerL18, author = {Graham Rymer and David Llewellyn{-}Jones}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Raven Authentication Service - Attacks and Countermeasures}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {1--14}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_1}, doi = {10.1007/978-3-030-03251-7\_1}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/RymerL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoL18, author = {Frank Stajano and T. Mark A. Lomas}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {User Authentication for the Internet of Things}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {209--213}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_25}, doi = {10.1007/978-3-030-03251-7\_25}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/StajanoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Weitzner18, author = {Daniel J. Weitzner}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {280--288}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_32}, doi = {10.1007/978-3-030-03251-7\_32}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Weitzner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan18, author = {Jeff Yan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {How Does Match-Fixing Inform Computer Game Security?}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {166--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_19}, doi = {10.1007/978-3-030-03251-7\_19}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Yan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan18a, author = {Jeff Yan}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {171--178}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_20}, doi = {10.1007/978-3-030-03251-7\_20}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Yan18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2018, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7}, doi = {10.1007/978-3-030-03251-7}, isbn = {978-3-030-03250-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson17, author = {Ross Anderson}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {157--170}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_18}, doi = {10.1007/978-3-319-71075-4\_18}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonB17, author = {Ross J. Anderson and Khaled Baqer}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Reconciling Multiple Objectives - Politics or Markets?}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {144--156}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_17}, doi = {10.1007/978-3-319-71075-4\_17}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Broz17, author = {Milan Broz}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Extending Full Disk Encryption for the Future}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {109--115}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_13}, doi = {10.1007/978-3-319-71075-4\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Broz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Broz17a, author = {Milan Broz}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Extending Full Disk Encryption for the Future (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {116--122}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_14}, doi = {10.1007/978-3-319-71075-4\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Broz17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bui17, author = {Thanh Bui}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Key Exchange with the Help of a Public Ledger (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {137--143}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_16}, doi = {10.1007/978-3-319-71075-4\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bui17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BuiA17, author = {Thanh Bui and Tuomas Aura}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Key Exchange with the Help of a Public Ledger}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {123--136}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_15}, doi = {10.1007/978-3-319-71075-4\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BuiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Choudary17, author = {Marios O. Choudary}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Security from Disjoint Paths: Is It Possible? (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {254--259}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_28}, doi = {10.1007/978-3-319-71075-4\_28}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Choudary17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chowdhury17, author = {Partha Das Chowdhury}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Self Attestation of Things (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {85--92}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_10}, doi = {10.1007/978-3-319-71075-4\_10}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Chowdhury17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChowdhuryC17, author = {Partha Das Chowdhury and Bruce Christianson}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Self Attestation of Things}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {76--84}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_9}, doi = {10.1007/978-3-319-71075-4\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChowdhuryC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clarke17, author = {Dylan Clarke}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {End to End Security is Not Enough (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {268--277}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_30}, doi = {10.1007/978-3-319-71075-4\_30}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Clarke17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkeA17, author = {Dylan Clarke and Syed Taha Ali}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {End to End Security is Not Enough}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {260--267}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_29}, doi = {10.1007/978-3-319-71075-4\_29}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ClarkeA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CosteaCR17, author = {Sergiu Costea and Marios O. Choudary and Costin Raiciu}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Security from Disjoint Paths: Is It Possible?}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {247--253}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_27}, doi = {10.1007/978-3-319-71075-4\_27}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/CosteaCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum17, author = {Joan Feigenbaum}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {9--17}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_2}, doi = {10.1007/978-3-319-71075-4\_2}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumF17, author = {Joan Feigenbaum and Bryan Ford}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Multiple Objectives of Lawful-Surveillance Protocols}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {1--8}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_1}, doi = {10.1007/978-3-319-71075-4\_1}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley17, author = {Simon N. Foley}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Getting Security Objectives Wrong: {A} Cautionary Tale of an Industrial Control System}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {18--29}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_3}, doi = {10.1007/978-3-319-71075-4\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley17a, author = {Simon N. Foley}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Getting Security Objectives Wrong: {A} Cautionary Tale of an Industrial Control System (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {30--37}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_4}, doi = {10.1007/978-3-319-71075-4\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorS17, author = {Virgil D. Gligor and Frank Stajano}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Assuring the Safety of Asymmetric Social Protocols}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {38--48}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_5}, doi = {10.1007/978-3-319-71075-4\_5}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/GligorS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jonker17, author = {Hugo Jonker}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Security Perspective on Publication Metrics (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {201--213}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_22}, doi = {10.1007/978-3-319-71075-4\_22}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Jonker17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerM17, author = {Hugo Jonker and Sjouke Mauw}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {A Security Perspective on Publication Metrics}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {186--200}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_21}, doi = {10.1007/978-3-319-71075-4\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciNNVW17, author = {Fabio Massacci and Chan Nam Ngo and Jing Nie and Daniele Venturi and Julian Williams}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {171--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_19}, doi = {10.1007/978-3-319-71075-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciNNVW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ngo17, author = {Chan Nam Ngo}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {180--185}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_20}, doi = {10.1007/978-3-319-71075-4\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ngo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RoscoeR17, author = {A. W. Roscoe and Peter Y. A. Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP}}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {278--297}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_31}, doi = {10.1007/978-3-319-71075-4\_31}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RoscoeR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan17, author = {Mark Dermot Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Making Decryption Accountable}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {93--98}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_11}, doi = {10.1007/978-3-319-71075-4\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan17a, author = {Mark Dermot Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Making Decryption Accountable (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {99--108}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_12}, doi = {10.1007/978-3-319-71075-4\_12}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan17b, author = {Peter Y. A. Ryan}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Auditable PAKEs: Approaching Fair Exchange Without a {TTP} (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {298--305}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_32}, doi = {10.1007/978-3-319-71075-4\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano17, author = {Frank Stajano}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {49--59}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_6}, doi = {10.1007/978-3-319-71075-4\_6}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Stajano17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Volp17, author = {Marcus V{\"{o}}lp}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {238--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_26}, doi = {10.1007/978-3-319-71075-4\_26}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Volp17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VolpRDYV17, author = {Marcus V{\"{o}}lp and Francisco Rocha and Jeremie Decouchant and Jiangshan Yu and Paulo Jorge Esteves Ver{\'{\i}}ssimo}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {232--237}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_25}, doi = {10.1007/978-3-319-71075-4\_25}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VolpRDYV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Weekes17, author = {Jonathan Weekes}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {224--231}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_24}, doi = {10.1007/978-3-319-71075-4\_24}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Weekes17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WeekesN17, author = {Jonathan Weekes and Shishir Nagaraja}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Controlling Your Neighbour's Bandwidth for Fun and for Profit}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {214--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_23}, doi = {10.1007/978-3-319-71075-4\_23}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/WeekesN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wernick17, author = {Paul Wernick}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Simulating Perceptions of Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {69--75}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_8}, doi = {10.1007/978-3-319-71075-4\_8}, timestamp = {Wed, 29 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Wernick17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WernickCS17, author = {Paul Wernick and Bruce Christianson and Joseph Spring}, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Simulating Perceptions of Security}, booktitle = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, pages = {60--68}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4\_7}, doi = {10.1007/978-3-319-71075-4\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WernickCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2016, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62033-6}, doi = {10.1007/978-3-319-62033-6}, isbn = {978-3-319-62032-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2017, editor = {Frank Stajano and Jonathan Anderson and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Security Protocols {XXV} - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10476}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71075-4}, doi = {10.1007/978-3-319-71075-4}, isbn = {978-3-319-71074-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerA16, author = {Khaled Baqer and Ross J. Anderson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {SMAPs: Short Message Authentication Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {133--140}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_16}, doi = {10.1007/978-3-319-62033-6\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerBAK16, author = {Khaled Baqer and S. Johann Bezuidenhoudt and Ross J. Anderson and Markus G. Kuhn}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {SMAPs: Short Message Authentication Protocols}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {119--132}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_15}, doi = {10.1007/978-3-319-62033-6\_15}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerBAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella16, author = {Giampaolo Bella}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Invisible Security (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {10--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_2}, doi = {10.1007/978-3-319-62033-6\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaC016, author = {Giampaolo Bella and Bruce Christianson and Luca Vigan{\`{o}}}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Invisible Security}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {1--9}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_1}, doi = {10.1007/978-3-319-62033-6\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaC016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson16, author = {Bruce Christianson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Price of Belief: Insuring Credible Trust? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {39--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_6}, doi = {10.1007/978-3-319-62033-6\_6}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor16, author = {Virgil D. Gligor}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link Flooding Incidents (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {58--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_8}, doi = {10.1007/978-3-319-62033-6\_8}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GoldbergJLS16, author = {Ian Goldberg and Graeme Jenkinson and David Llewellyn{-}Jones and Frank Stajano}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Red Button and Yellow Button: Usable Security for Lost Security Tokens}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {165--171}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_19}, doi = {10.1007/978-3-319-62033-6\_19}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GoldbergJLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Happe16, author = {Andreas Happe}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {215--218}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_24}, doi = {10.1007/978-3-319-62033-6\_24}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Happe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HappeKL16, author = {Andreas Happe and Stephan Krenn and Thomas Lor{\"{u}}nser}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Malicious Clients in Distributed Secret Sharing Based Storage Networks}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {206--214}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_23}, doi = {10.1007/978-3-319-62033-6\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HappeKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jonker16, author = {Hugo Jonker}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {26--34}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_4}, doi = {10.1007/978-3-319-62033-6\_4}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jonker16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMT16, author = {Hugo L. Jonker and Sjouke Mauw and Rolando Trujillo{-}Rasua}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {19--25}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_3}, doi = {10.1007/978-3-319-62033-6\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KangGS16, author = {Min Suk Kang and Virgil D. Gligor and Vyas Sekar}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link Flooding Incidents}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {47--57}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_7}, doi = {10.1007/978-3-319-62033-6\_7}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KangGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kidney16, author = {Brian J. Kidney}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Exploiting Autocorrect to Attack Privacy (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {110--118}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_14}, doi = {10.1007/978-3-319-62033-6\_14}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kidney16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KidneyA16, author = {Brian J. Kidney and Jonathan Anderson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Exploiting Autocorrect to Attack Privacy}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {103--109}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_13}, doi = {10.1007/978-3-319-62033-6\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KidneyA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16, author = {David Llewellyn{-}Jones and Graeme Jenkinson and Frank Stajano}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Explicit Delegation Using Configurable Cookies}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {141--152}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_17}, doi = {10.1007/978-3-319-62033-6\_17}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16a, author = {David Llewellyn{-}Jones}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Explicit Delegation Using Configurable Cookies (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {153--164}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_18}, doi = {10.1007/978-3-319-62033-6\_18}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OstadalSM16, author = {Radim Ost{\'{a}}dal and Petr Svenda and Vashek Maty{\'{a}}s}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Reconsidering Attacker Models in Ad-Hoc Networks}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {219--227}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_25}, doi = {10.1007/978-3-319-62033-6\_25}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/OstadalSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF16, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Evolution of a Security Control}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {67--84}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_9}, doi = {10.1007/978-3-319-62033-6\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/PieczulF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF16a, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {85--89}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_10}, doi = {10.1007/978-3-319-62033-6\_10}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PieczulF16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roscoe16, author = {A. W. Roscoe}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Detecting Failed Attacks on Human-Interactive Security Protocols}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {181--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_21}, doi = {10.1007/978-3-319-62033-6\_21}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roscoe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roscoe16a, author = {A. W. Roscoe}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {198--205}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_22}, doi = {10.1007/978-3-319-62033-6\_22}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roscoe16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano16, author = {Frank Stajano}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {172--180}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_20}, doi = {10.1007/978-3-319-62033-6\_20}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Svenda16, author = {Petr Svenda}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {228--231}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_26}, doi = {10.1007/978-3-319-62033-6\_26}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Svenda16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WernickC16, author = {Paul Wernick and Bruce Christianson}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {The Price of Belief: Insuring Credible Trust?}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {35--38}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_5}, doi = {10.1007/978-3-319-62033-6\_5}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WernickC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan16, author = {Jeff Yan}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Novel Security and Privacy Perspectives of Camera Fingerprints}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {90--95}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_11}, doi = {10.1007/978-3-319-62033-6\_11}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan16a, author = {Jeff Yan}, editor = {Jonathan Anderson and Vashek Maty{\'{a}}s and Bruce Christianson and Frank Stajano}, title = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)}, booktitle = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10368}, pages = {96--102}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62033-6\_12}, doi = {10.1007/978-3-319-62033-6\_12}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ali15, author = {Syed Taha Ali}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Bitcoin: Perils of an Unregulated Global {P2P} Currency (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {294--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_30}, doi = {10.1007/978-3-319-26096-9\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ali15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AliCM15, author = {Syed Taha Ali and Dylan Clarke and Patrick McCorry}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Bitcoin: Perils of an Unregulated Global {P2P} Currency}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {283--293}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_29}, doi = {10.1007/978-3-319-26096-9\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AliCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Atashpendar15, author = {Arash Atashpendar}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {342--349}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_34}, doi = {10.1007/978-3-319-26096-9\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Atashpendar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AtashpendarRR15, author = {Arash Atashpendar and A. W. Roscoe and Peter Y. A. Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Information Leakage Due to Revealing Randomly Selected Bits}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {325--341}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_33}, doi = {10.1007/978-3-319-26096-9\_33}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AtashpendarRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerA15, author = {Khaled Baqer and Ross J. Anderson}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Do You Believe in Tinker Bell? The Social Externalities of Trust}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {224--236}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_23}, doi = {10.1007/978-3-319-26096-9\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaqerA15a, author = {Khaled Baqer and Ross J. Anderson}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {237--246}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_24}, doi = {10.1007/978-3-319-26096-9\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaqerA15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaV15, author = {Giampaolo Bella and Luca Vigan{\`{o}}}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security is Beautiful}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {247--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_25}, doi = {10.1007/978-3-319-26096-9\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BukacOSBM15, author = {Vit Bukac and Radim Ost{\'{a}}dal and Petr Svenda and Tatevik Baghdasaryan and Vashek Matyas}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Challenges of Fiction in Network Security - Perspective of Virtualized Environments}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {145--151}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_15}, doi = {10.1007/978-3-319-26096-9\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BukacOSBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clark15, author = {Sandy Clark}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {183--194}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_20}, doi = {10.1007/978-3-319-26096-9\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clark15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS15, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {178--182}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_19}, doi = {10.1007/978-3-319-26096-9\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dashti15, author = {Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {47--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_6}, doi = {10.1007/978-3-319-26096-9\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dashti15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dong15, author = {Changyu Dong}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Efficient Data Intensive Secure Computation: Fictional or Real?}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {350--360}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_35}, doi = {10.1007/978-3-319-26096-9\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dong15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dong15a, author = {Changyu Dong}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {361--363}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_36}, doi = {10.1007/978-3-319-26096-9\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dong15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum15, author = {Joan Feigenbaum}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {276--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_28}, doi = {10.1007/978-3-319-26096-9\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumR15, author = {Joan Feigenbaum and Brad Rosen}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {On the Use of Security and Privacy Technology as a Plot Device}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {261--275}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_27}, doi = {10.1007/978-3-319-26096-9\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyP15, author = {Simon N. Foley and Olgierd Pieczul}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Dark Side of the Code (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {12--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_2}, doi = {10.1007/978-3-319-26096-9\_2}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FoleyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor15, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {69--79}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_8}, doi = {10.1007/978-3-319-26096-9\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Irwin15, author = {Keith Irwin}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Redesigning Secure Protocols to Compel Security Checks}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {22--29}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_3}, doi = {10.1007/978-3-319-26096-9\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Irwin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Irwin15a, author = {Keith Irwin}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {30--40}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_4}, doi = {10.1007/978-3-319-26096-9\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Irwin15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JonkerMR15, author = {Hugo Jonker and Sjouke Mauw and Sasa Radomirovic}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {105--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_11}, doi = {10.1007/978-3-319-26096-9\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/JonkerMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LiCGP15, author = {Yanlin Li and Yueqiang Cheng and Virgil D. Gligor and Adrian Perrig}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {50--68}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_7}, doi = {10.1007/978-3-319-26096-9\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LiCGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw15, author = {Sjouke Mauw}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Location-Private Interstellar Communication (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {116--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_12}, doi = {10.1007/978-3-319-26096-9\_12}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ostadal15, author = {Radim Ost{\'{a}}dal}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {152--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_16}, doi = {10.1007/978-3-319-26096-9\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ostadal15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF15, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Dark Side of the Code}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {1--11}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_1}, doi = {10.1007/978-3-319-26096-9\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/PieczulF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RadomirovicD15, author = {Sasa Radomirovic and Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {41--46}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_5}, doi = {10.1007/978-3-319-26096-9\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan15, author = {Mark Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Device Attacker Models: Fact and Fiction (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {168--177}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_18}, doi = {10.1007/978-3-319-26096-9\_18}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Ryan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano15, author = {Frank Stajano}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Pico Without Public Keys (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {212--223}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_22}, doi = {10.1007/978-3-319-26096-9\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoCLJPSS15, author = {Frank Stajano and Bruce Christianson and T. Mark A. Lomas and Graeme Jenkinson and Jeunese A. Payne and Max Spencer and Quentin Stafford{-}Fraser}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Pico Without Public Keys}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {195--211}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_21}, doi = {10.1007/978-3-319-26096-9\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StajanoCLJPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Thomas15, author = {Daniel R. Thomas}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Lifetime of Android {API} Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {139--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_14}, doi = {10.1007/978-3-319-26096-9\_14}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Thomas15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ThomasBCST15, author = {Daniel R. Thomas and Alastair R. Beresford and Thomas Coudray and Tom Sutcliffe and Adrian Taylor}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Lifetime of Android {API} Vulnerabilities: Case Study on the JavaScript-to-Java Interface}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {126--138}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_13}, doi = {10.1007/978-3-319-26096-9\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ThomasBCST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VaidyaS15, author = {Tavish Vaidya and Micah Sherr}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Mind Your (R, {\textbackslash}varPhi {)} s: Location-Based Privacy Controls for Consumer Drones}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {80--90}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_9}, doi = {10.1007/978-3-319-26096-9\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VaidyaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/VaidyaS15a, author = {Tavish Vaidya and Micah Sherr}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Mind Your (R, {\textbackslash}varPhi {)} s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {91--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_10}, doi = {10.1007/978-3-319-26096-9\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/VaidyaS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Vigano15, author = {Luca Vigan{\`{o}}}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security is Beautiful (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {251--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_26}, doi = {10.1007/978-3-319-26096-9\_26}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Vigano15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wernick15, author = {Paul Wernick}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {314--324}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_32}, doi = {10.1007/978-3-319-26096-9\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wernick15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WernickC15, author = {Paul Wernick and Bruce Christianson}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past"}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {307--313}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_31}, doi = {10.1007/978-3-319-26096-9\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WernickC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuR15, author = {Jiangshan Yu and Mark Dermot Ryan}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Device Attacker Models: Fact and Fiction}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {158--167}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_17}, doi = {10.1007/978-3-319-26096-9\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/YuR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2015, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9}, doi = {10.1007/978-3-319-26096-9}, isbn = {978-3-319-26095-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonH14, author = {Ross J. Anderson and Chris Hall}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Collaborating with the Enemy on Network Management (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {163--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_16}, doi = {10.1007/978-3-319-12400-1\_16}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau14, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {FawkesCoin: {A} Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {359--370}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_36}, doi = {10.1007/978-3-319-12400-1\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BonneauM14, author = {Joseph Bonneau and Andrew Miller}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Fawkescoin - {A} Cryptocurrency Without Public-Key Cryptography}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {350--358}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_35}, doi = {10.1007/978-3-319-12400-1\_35}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BonneauM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bukac14, author = {Vit Bukac}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Red Queen's Race: {APT} Win-Win Game (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {62--68}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_8}, doi = {10.1007/978-3-319-12400-1\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bukac14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BukacLM14, author = {Vit Bukac and Vaclav Lorenc and Vashek Maty{\'{a}}s}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Red Queen's Race: {APT} Win-Win Game}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {55--61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_7}, doi = {10.1007/978-3-319-12400-1\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BukacLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chowdhury14, author = {Partha Das Chowdhury}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Beyond Trust (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {345--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_34}, doi = {10.1007/978-3-319-12400-1\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chowdhury14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChowdhuryC14, author = {Partha Das Chowdhury and Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Beyond Trust}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {340--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_33}, doi = {10.1007/978-3-319-12400-1\_33}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChowdhuryC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt14, author = {Yvo Desmedt}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {276--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_27}, doi = {10.1007/978-3-319-12400-1\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt14a, author = {Yvo Desmedt}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {286--299}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_28}, doi = {10.1007/978-3-319-12400-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumK14, author = {Joan Feigenbaum and J{\'{e}}r{\'{e}}mie Koenig}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Feasibility of a Technological Response to the Surveillance Morass}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {239--252}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_23}, doi = {10.1007/978-3-319-12400-1\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumK14a, author = {Joan Feigenbaum and J{\'{e}}r{\'{e}}mie Koenig}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {253--262}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_24}, doi = {10.1007/978-3-319-12400-1\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley14, author = {Simon N. Foley}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {28--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_4}, doi = {10.1007/978-3-319-12400-1\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GardinerN14, author = {Joseph Gardiner and Shishir Nagaraja}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {321--333}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_31}, doi = {10.1007/978-3-319-12400-1\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GardinerN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Giustolisi14, author = {Rosario Giustolisi}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Remark!: {A} Secure Protocol for Remote Exams (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {49--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_6}, doi = {10.1007/978-3-319-12400-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Giustolisi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GiustolisiLR14, author = {Rosario Giustolisi and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Remark!: {A} Secure Protocol for Remote Exams}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {38--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_5}, doi = {10.1007/978-3-319-12400-1\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GiustolisiLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor14, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Dancing with the Adversary: {A} Tale of Wimps and Giants}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {100--115}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_11}, doi = {10.1007/978-3-319-12400-1\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor14a, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Dancing with the Adversary: {A} Tale of Wimps and Giants (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {116--129}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_12}, doi = {10.1007/978-3-319-12400-1\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann14, author = {Dieter Gollmann}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Why Bother Securing DNS?}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {1--8}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_1}, doi = {10.1007/978-3-319-12400-1\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann14a, author = {Dieter Gollmann}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Why Bother Securing DNS? (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {9--17}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_2}, doi = {10.1007/978-3-319-12400-1\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HallYZSOMCBA14, author = {Chris Hall and Dongting Yu and Zhi{-}Li Zhang and Jonathan Stout and Andrew M. Odlyzko and Andrew W. Moore and L. Jean Camp and Kevin Benton and Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Collaborating with the Enemy on Network Management}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {154--162}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_15}, doi = {10.1007/978-3-319-12400-1\_15}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HallYZSOMCBA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JaggardW14, author = {Aaron D. Jaggard and Rebecca N. Wright}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Strange Bedfellows: How and When to Work with Your Enemy}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {263--267}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_25}, doi = {10.1007/978-3-319-12400-1\_25}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JaggardW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JenkinsonSWS14, author = {Graeme Jenkinson and Max Spencer and Chris Warrington and Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {I Bought a New Security Token and All {I} Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {197--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_19}, doi = {10.1007/978-3-319-12400-1\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JenkinsonSWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jurnecka14, author = {Filip Jurnecka}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On Node Capturing Attacker Strategies (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {316--320}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_30}, doi = {10.1007/978-3-319-12400-1\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jurnecka14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JurneckaSM14, author = {Filip Jurnecka and Martin Stehl{\'{\i}}k and Vashek Maty{\'{a}}s}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On Node Capturing Attacker Strategies}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {300--315}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_29}, doi = {10.1007/978-3-319-12400-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JurneckaSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nagaraja14, author = {Shishir Nagaraja}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {334--339}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_32}, doi = {10.1007/978-3-319-12400-1\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nagaraja14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PeroliVZ14, author = {Michele Peroli and Luca Vigan{\`{o}} and Matteo Zavatteri}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {69--90}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_9}, doi = {10.1007/978-3-319-12400-1\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PeroliVZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PieczulF14, author = {Olgierd Pieczul and Simon N. Foley}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Collaborating as Normal: Detecting Systemic Anomalies in Your Partner}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {18--27}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_3}, doi = {10.1007/978-3-319-12400-1\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/PieczulF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Spencer14, author = {Max Spencer}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {216--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_20}, doi = {10.1007/978-3-319-12400-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Spencer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano14, author = {Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {187--196}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_18}, doi = {10.1007/978-3-319-12400-1\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoJPSSW14, author = {Frank Stajano and Graeme Jenkinson and Jeunese A. Payne and Max Spencer and Quentin Stafford{-}Fraser and Chris Warrington}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Bootstrapping Adoption of the Pico Password Replacement System}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {172--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_17}, doi = {10.1007/978-3-319-12400-1\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StajanoJPSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/TanS14, author = {Henry Tan and Micah Sherr}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Censorship Resistance as a Side-Effect}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {221--226}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_21}, doi = {10.1007/978-3-319-12400-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/TanS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/TanS14a, author = {Henry Tan and Micah Sherr}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Censorship Resistance as a Side-Effect (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {227--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_22}, doi = {10.1007/978-3-319-12400-1\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/TanS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Thomas14, author = {Daniel R. Thomas}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Better Authentication Password Revolution by Evolution (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {146--153}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_14}, doi = {10.1007/978-3-319-12400-1\_14}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Thomas14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ThomasB14, author = {Daniel R. Thomas and Alastair R. Beresford}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Better Authentication: Password Revolution by Evolution}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {130--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_13}, doi = {10.1007/978-3-319-12400-1\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ThomasB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Vigano14, author = {Luca Vigan{\`{o}}}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {91--99}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_10}, doi = {10.1007/978-3-319-12400-1\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Vigano14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wright14, author = {Rebecca N. Wright}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {268--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_26}, doi = {10.1007/978-3-319-12400-1\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wright14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2010, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45921-8}, doi = {10.1007/978-3-662-45921-8}, isbn = {978-3-662-45920-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2014, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1}, doi = {10.1007/978-3-319-12400-1}, isbn = {978-3-319-12399-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Almeshekah13, author = {Mohammed H. Almeshekah}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {196--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_23}, doi = {10.1007/978-3-642-41717-7\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Almeshekah13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AlmeshekahAS13, author = {Mohammed H. Almeshekah and Mikhail J. Atallah and Eugene H. Spafford}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {189--195}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_22}, doi = {10.1007/978-3-642-41717-7\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AlmeshekahAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BenalohRT13, author = {Josh Benaloh and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Postal Voting}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {54--65}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_8}, doi = {10.1007/978-3-642-41717-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BenalohRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bergadano13, author = {Francesco Bergadano}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Communication Setup in Anonymous Messaging}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {161--169}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_18}, doi = {10.1007/978-3-642-41717-7\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bergadano13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bergadano13a, author = {Francesco Bergadano}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Communication Setup in Anonymous Messaging (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {170--175}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_19}, doi = {10.1007/978-3-642-41717-7\_19}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bergadano13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson13, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Introduction: What's Happening on the Other Channel? (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {1--2}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_1}, doi = {10.1007/978-3-642-41717-7\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor13, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {115--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_13}, doi = {10.1007/978-3-642-41717-7\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao13, author = {Feng Hao}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {255--264}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_29}, doi = {10.1007/978-3-642-41717-7\_29}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoCS13, author = {Feng Hao and Dylan Clarke and Carlton Shepherd}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {245--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_28}, doi = {10.1007/978-3-642-41717-7\_28}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KhuranaN13, author = {Rushil Khurana and Shishir Nagaraja}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {143--151}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_16}, doi = {10.1007/978-3-642-41717-7\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KhuranaN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nagaraja13, author = {Shishir Nagaraja}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {152--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_17}, doi = {10.1007/978-3-642-41717-7\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nagaraja13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan13, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Enhancements to Prepare-and-Measure-Based {QKD} Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {134--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_15}, doi = {10.1007/978-3-642-41717-7\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanC13, author = {Peter Y. A. Ryan and Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Enhancements to Prepare-and-Measure Based {QKD} Protocols}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {123--133}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_14}, doi = {10.1007/978-3-642-41717-7\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stulman13, author = {Ariel Stulman}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {213--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_25}, doi = {10.1007/978-3-642-41717-7\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stulman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StulmanLS13, author = {Ariel Stulman and Jonathan Lahav and Avraham Shmueli}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {202--212}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_24}, doi = {10.1007/978-3-642-41717-7\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StulmanLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Svenda13, author = {Petr Svenda}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {On the Origin of Yet another Channel (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {238--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_27}, doi = {10.1007/978-3-642-41717-7\_27}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Svenda13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SvendaM13, author = {Petr Svenda and V{\'{a}}clav Maty{\'{a}}s}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {On the Origin of Yet another Channel}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {223--237}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_26}, doi = {10.1007/978-3-642-41717-7\_26}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SvendaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Teague13, author = {Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {End-to-End Verifiable Postal Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {66--70}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_9}, doi = {10.1007/978-3-642-41717-7\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Teague13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Watson13, author = {Robert N. M. Watson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Theory of Application Compartmentalisation (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {28--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_5}, doi = {10.1007/978-3-642-41717-7\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Watson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WatsonMGANL13, author = {Robert N. M. Watson and Steven J. Murdoch and Khilan Gudka and Jonathan Anderson and Peter G. Neumann and Ben Laurie}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Theory of Application Compartmentalisation}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {19--27}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_4}, doi = {10.1007/978-3-642-41717-7\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WatsonMGANL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Xu13, author = {Rubin Xu}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Stronger Location Integrity (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {180--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_21}, doi = {10.1007/978-3-642-41717-7\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Xu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/XuY13, author = {Rubin Xu and Dongting Yu}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Stronger Location Integrity}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {176--179}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_20}, doi = {10.1007/978-3-642-41717-7\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/XuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan13, author = {Jeff Yan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards New Security Primitives Based on Hard {AI} Problems (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {11--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_3}, doi = {10.1007/978-3-642-41717-7\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yasinsac13, author = {Alec Yasinsac}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Independent Computations for Safe Remote Electronic Voting}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {71--83}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_10}, doi = {10.1007/978-3-642-41717-7\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yasinsac13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yasinsac13a, author = {Alec Yasinsac}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {84--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_11}, doi = {10.1007/978-3-642-41717-7\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yasinsac13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yu13, author = {Dongting Yu}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Authentication for Resilience: The Case of {SDN} (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {45--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_7}, doi = {10.1007/978-3-642-41717-7\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuMHA13, author = {Dongting Yu and Andrew W. Moore and Chris Hall and Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Authentication for Resilience: The Case of {SDN}}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {39--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_6}, doi = {10.1007/978-3-642-41717-7\_6}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YuMHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ZhaoGPN13, author = {Jun Zhao and Virgil D. Gligor and Adrian Perrig and James Newsome}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {94--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_12}, doi = {10.1007/978-3-642-41717-7\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ZhaoGPN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ZhuY13, author = {Bin B. Zhu and Jeff Yan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards New Security Primitives Based on Hard {AI} Problems}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {3--10}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_2}, doi = {10.1007/978-3-642-41717-7\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ZhuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2009, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36213-2}, doi = {10.1007/978-3-642-36213-2}, isbn = {978-3-642-36212-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2013, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7}, doi = {10.1007/978-3-642-41717-7}, isbn = {978-3-642-41716-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Andel12, author = {Todd R. Andel}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {15--22}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_3}, doi = {10.1007/978-3-642-35694-0\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Andel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndelY12, author = {Todd R. Andel and Alec Yasinsac}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Secure Internet Voting Protocol for Overseas Military Voters}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {3--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_2}, doi = {10.1007/978-3-642-35694-0\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndelY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson12, author = {Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Protocol Governance: The Elite, or the Mob?}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {145}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_16}, doi = {10.1007/978-3-642-35694-0\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson12a, author = {Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Protocol Governance: The Elite, or the Mob? (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {146--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_17}, doi = {10.1007/978-3-642-35694-0\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson12b, author = {Jonathan Anderson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {251--258}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_27}, doi = {10.1007/978-3-642-35694-0\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Anderson12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonW12, author = {Jonathan Anderson and Robert N. M. Watson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Stayin' Alive: Aliveness as an Alternative to Authentication}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {242--250}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_26}, doi = {10.1007/978-3-642-35694-0\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze12, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Casino and the {OODA} Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {64--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_9}, doi = {10.1007/978-3-642-35694-0\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau12, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Statistical Metrics for Individual Password Strength}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {76--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_10}, doi = {10.1007/978-3-642-35694-0\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau12a, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Statistical Metrics for Individual Password Strength (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {87--95}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_11}, doi = {10.1007/978-3-642-35694-0\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Brooke12, author = {Phillip J. Brooke}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {55--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_7}, doi = {10.1007/978-3-642-35694-0\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Brooke12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BrookePP12, author = {Phillip J. Brooke and Richard F. Paige and Christopher Power}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Approaches to Modelling Security Scenarios with Domain-Specific Languages}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {41--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_6}, doi = {10.1007/978-3-642-35694-0\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BrookePP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CanlarCCP12, author = {Ey{\"{u}}p S. Canlar and Mauro Conti and Bruno Crispo and Roberto Di Pietro}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking System}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {199--213}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_22}, doi = {10.1007/978-3-642-35694-0\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CanlarCCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson12, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Introduction: Bringing Protocols to Life (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {1--2}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_1}, doi = {10.1007/978-3-642-35694-0\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS12, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {The Casino and the {OODA} Loop - Why Our Protocols Always Eventually Fail}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {60--63}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_8}, doi = {10.1007/978-3-642-35694-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clarke12, author = {Dylan Clarke}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Analysis of Issues and Challenges of E-Voting in the {UK} (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {136--144}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_15}, doi = {10.1007/978-3-642-35694-0\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clarke12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkeHR12, author = {Dylan Clarke and Feng Hao and Brian Randell}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Analysis of Issues and Challenges of E-Voting in the {UK}}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {126--135}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_14}, doi = {10.1007/978-3-642-35694-0\_14}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkeHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Conti12, author = {Mauro Conti}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Sense-And-Trace: {A} Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {214--222}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_23}, doi = {10.1007/978-3-642-35694-0\_23}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Conti12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor12, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {116--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_13}, doi = {10.1007/978-3-642-35694-0\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao12, author = {Feng Hao}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Self-enforcing Electronic Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {32--40}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_5}, doi = {10.1007/978-3-642-35694-0\_5}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoRC12, author = {Feng Hao and Brian Randell and Dylan Clarke}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Self-enforcing Electronic Voting}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {23--31}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_4}, doi = {10.1007/978-3-642-35694-0\_4}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KimGP12, author = {Tiffany Hyun{-}Jin Kim and Virgil D. Gligor and Adrian Perrig}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Street-Level Trust Semantics for Attribute Authentication}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {96--115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_12}, doi = {10.1007/978-3-642-35694-0\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KimGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mahmood12, author = {Shah Mahmood}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {189--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_21}, doi = {10.1007/978-3-642-35694-0\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mahmood12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MahmoodD12, author = {Shah Mahmood and Yvo Desmedt}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Usable Privacy by Visual and Interactive Control of Information Flow}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {181--188}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_20}, doi = {10.1007/978-3-642-35694-0\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MahmoodD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murayama12, author = {Yuko Murayama}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Usability Issues in Security (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {172--180}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_19}, doi = {10.1007/978-3-642-35694-0\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murayama12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MurayamaFSN12, author = {Yuko Murayama and Yasuhiro Fujihara and Yoshia Saito and Dai Nishioka}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Usability Issues in Security}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {161--171}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_18}, doi = {10.1007/978-3-642-35694-0\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MurayamaFSN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano12, author = {Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Am {I} in Good Company? {A} Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {231--241}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_25}, doi = {10.1007/978-3-642-35694-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StannardS12, author = {Oliver Stannard and Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Am {I} in Good Company? {A} Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {223--230}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_24}, doi = {10.1007/978-3-642-35694-0\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StannardS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Syverson12, author = {Paul Syverson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Paul Revere Protocols}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {259--266}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_28}, doi = {10.1007/978-3-642-35694-0\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Syverson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Syverson12a, author = {Paul Syverson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Paul Revere Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, pages = {267--275}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0\_29}, doi = {10.1007/978-3-642-35694-0\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Syverson12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2012, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Security Protocols {XX} - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7622}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35694-0}, doi = {10.1007/978-3-642-35694-0}, isbn = {978-3-642-35693-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson11, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Can We Fix the Security Economics of Federated Authentication?}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {25--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_4}, doi = {10.1007/978-3-642-25867-1\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson11a, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {33--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_5}, doi = {10.1007/978-3-642-25867-1\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson11b, author = {Jonathan Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Keep Bad Papers Out of Conferences (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {368--380}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_35}, doi = {10.1007/978-3-642-25867-1\_35}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Anderson11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonSW11, author = {Jonathan Anderson and Frank Stajano and Robert N. M. Watson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {359--367}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_34}, doi = {10.1007/978-3-642-25867-1\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze11, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {One-Way Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {341--358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_33}, doi = {10.1007/978-3-642-25867-1\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau11, author = {Joseph Bonneau}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Getting Web Authentication Right {A} Best-Case Protocol for the Remaining Life of Passwords}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {98--104}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_8}, doi = {10.1007/978-3-642-25867-1\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau11a, author = {Joseph Bonneau}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Getting Web Authentication Right (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {105--114}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_9}, doi = {10.1007/978-3-642-25867-1\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BonneauX11, author = {Joseph Bonneau and Rubin Xu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Scrambling for Lightweight Censorship Resistance}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {296--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_28}, doi = {10.1007/978-3-642-25867-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BonneauX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Burmester11, author = {Mike Burmester}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {His Late Master's Voice: Barking for Location Privacy}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {4--14}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_2}, doi = {10.1007/978-3-642-25867-1\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Burmester11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Burmester11a, author = {Mike Burmester}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {His Late Master's Voice (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {15--24}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_3}, doi = {10.1007/978-3-642-25867-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Burmester11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chen11, author = {Bangdao Chen}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {When Context Is Better Than Identity (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {126--131}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_11}, doi = {10.1007/978-3-642-25867-1\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenNR11, author = {Bangdao Chen and Long Hoang Nguyen and Andrew William Roscoe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {When Context Is Better Than Identity: Authentication by Context Using Empirical Channels}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {115--125}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_10}, doi = {10.1007/978-3-642-25867-1\_10}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChenNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Choudary11, author = {Omar Choudary}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Make Noise and Whisper: {A} Solution to Relay Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {284--295}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_27}, doi = {10.1007/978-3-642-25867-1\_27}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Choudary11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChoudaryS11, author = {Omar Choudary and Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Make Noise and Whisper: {A} Solution to Relay Attacks}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {271--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_26}, doi = {10.1007/978-3-642-25867-1\_26}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChoudaryS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson11, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Introduction: Alice Doesn't Live Here Anymore (Transcript)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {1--3}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_1}, doi = {10.1007/978-3-642-25867-1\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkGMWXB11, author = {Sandy Clark and Travis Goodspeed and Perry Metzger and Zachary Wasserman and Kevin Xu and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {One-Way Cryptography}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {336--340}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_32}, doi = {10.1007/978-3-642-25867-1\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkGMWXB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor11, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {243--257}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_23}, doi = {10.1007/978-3-642-25867-1\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorW11, author = {Virgil D. Gligor and Jeannette M. Wing}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Towards a Theory of Trust in Networks of Humans and Computers}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {223--242}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_22}, doi = {10.1007/978-3-642-25867-1\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao11, author = {Feng Hao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Sync with Alice (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {179--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_17}, doi = {10.1007/978-3-642-25867-1\_17}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoR11, author = {Feng Hao and Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Sync with Alice}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {170--178}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_16}, doi = {10.1007/978-3-642-25867-1\_16}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KurMSS11, author = {Jir{\'{\i}} Kur and Vashek Matyas and Andriy Stetsko and Petr Svenda}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Attack Detection vs. Privacy - How to Find the Link or How to Hide It?}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {189--199}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_18}, doi = {10.1007/978-3-642-25867-1\_18}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KurMSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KurS11, author = {Jir{\'{\i}} Kur and Andriy Stetsko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {200--204}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_19}, doi = {10.1007/978-3-642-25867-1\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KurS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LenziniMP11, author = {Gabriele Lenzini and Sjouke Mauw and Jun Pang}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Selective Location Blinding Using Hash Chains}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {132--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_12}, doi = {10.1007/978-3-642-25867-1\_12}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LenziniMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Malcolm11, author = {James Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {215--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_21}, doi = {10.1007/978-3-642-25867-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Malcolm11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw11, author = {Sjouke Mauw}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Selective Location Blinding Using Hash Chains (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {142--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_13}, doi = {10.1007/978-3-642-25867-1\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MurayamaFN11, author = {Yuko Murayama and Yasuhiro Fujihara and Dai Nishioka}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Sense of Security and a Countermeasure for the False Sense}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {205--214}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_20}, doi = {10.1007/978-3-642-25867-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MurayamaFN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe11, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Metaplace Security Model}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {313--326}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_30}, doi = {10.1007/978-3-642-25867-1\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe11a, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Metaplace Security Model (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {327--335}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_31}, doi = {10.1007/978-3-642-25867-1\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Shafarenko11, author = {Alex Shafarenko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {260--270}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_25}, doi = {10.1007/978-3-642-25867-1\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Shafarenko11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ShafarenkoC11, author = {Alexander V. Shafarenko and Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Gearing Up: How to Eat Your Cryptocake and Still Have It}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {258--259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_24}, doi = {10.1007/978-3-642-25867-1\_24}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ShafarenkoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano11, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Pico: No More Passwords!}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {49--81}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_6}, doi = {10.1007/978-3-642-25867-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano11a, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Pico: No More Passwords! (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {82--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_7}, doi = {10.1007/978-3-642-25867-1\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Xu11, author = {Rubin Xu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {303--312}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_29}, doi = {10.1007/978-3-642-25867-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Xu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Zugenmaier11, author = {Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {150--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_14}, doi = {10.1007/978-3-642-25867-1\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Zugenmaier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Zugenmaier11a, author = {Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {156--169}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_15}, doi = {10.1007/978-3-642-25867-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Zugenmaier11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2008, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22137-8}, doi = {10.1007/978-3-642-22137-8}, isbn = {978-3-642-22136-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2011, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1}, doi = {10.1007/978-3-642-25867-1}, isbn = {978-3-642-25866-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Aloteibi10, author = {Saad Aloteibi}, editor = {Bruce Christianson and James A. Malcolm}, title = {On the Value of Hybrid Security Testing (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {214--216}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_31}, doi = {10.1007/978-3-662-45921-8\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Aloteibi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AloteibiS10, author = {Saad Aloteibi and Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm}, title = {On the Value of Hybrid Security Testing}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {207--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_30}, doi = {10.1007/978-3-662-45921-8\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AloteibiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson10, author = {Jonathan Anderson}, editor = {Bruce Christianson and James A. Malcolm}, title = {On Storing Private Keys in the Cloud (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {107--114}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_17}, doi = {10.1007/978-3-662-45921-8\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson10a, author = {Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm}, title = {It's the Anthropology, Stupid! (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {131--141}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_21}, doi = {10.1007/978-3-662-45921-8\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonS10, author = {Jonathan Anderson and Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm}, title = {On Storing Private Keys in the Cloud}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {98--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_16}, doi = {10.1007/978-3-662-45921-8\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonS10a, author = {Ross J. Anderson and Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm}, title = {It's the Anthropology, Stupid!}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {127--130}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_20}, doi = {10.1007/978-3-662-45921-8\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaRT10, author = {Giampaolo Bella and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm}, title = {Virtually Perfect Democracy}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {161--166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_24}, doi = {10.1007/978-3-662-45921-8\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau10, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm}, title = {Digital Immolation - New Directions for Online Protest}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {25--33}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_6}, doi = {10.1007/978-3-662-45921-8\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau10a, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm}, title = {Digital Immolation (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {34--44}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_7}, doi = {10.1007/978-3-662-45921-8\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChowdhuryC10, author = {Partha Das Chowdhury and Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm}, title = {More Security or Less Insecurity}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {115--119}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_18}, doi = {10.1007/978-3-662-45921-8\_18}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChowdhuryC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson10, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm}, title = {Introduction: Virtually Perfect Security (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {1--2}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_1}, doi = {10.1007/978-3-662-45921-8\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson10a, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm}, title = {More Security or Less Insecurity (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {120--126}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_19}, doi = {10.1007/978-3-662-45921-8\_19}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson10b, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm}, title = {Recapitulation}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {266}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_36}, doi = {10.1007/978-3-662-45921-8\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonSSW10, author = {Bruce Christianson and Alex Shafarenko and Frank Stajano and Ford{-}Long Wong}, editor = {Bruce Christianson and James A. Malcolm}, title = {Relay-Proof Channels Using {UWB} Lasers}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {45--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_8}, doi = {10.1007/978-3-662-45921-8\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonSSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clark10, author = {Sandy Clark}, editor = {Bruce Christianson and James A. Malcolm}, title = {Blood in the Water (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {18--24}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_5}, doi = {10.1007/978-3-662-45921-8\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clark10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkBS10, author = {Sandy Clark and Matt Blaze and Jonathan M. Smith}, editor = {Bruce Christianson and James A. Malcolm}, title = {Blood in the Water - Are there Honeymoon Effects Outside Software?}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {12--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_4}, doi = {10.1007/978-3-662-45921-8\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Conti10, author = {Mauro Conti}, editor = {Bruce Christianson and James A. Malcolm}, title = {Censorship-Resilient Communications through Information Scattering (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {90--97}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_15}, doi = {10.1007/978-3-662-45921-8\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Conti10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis10, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm}, title = {Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {74--81}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_13}, doi = {10.1007/978-3-662-45921-8\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor10, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Limitations of Virtualization and How to Overcome Them}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {233--251}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_34}, doi = {10.1007/978-3-662-45921-8\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor10a, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {252--265}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_35}, doi = {10.1007/978-3-662-45921-8\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann10, author = {Dieter Gollmann}, editor = {Bruce Christianson and James A. Malcolm}, title = {Caught in the Maze of Security Standards (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {4--11}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_3}, doi = {10.1007/978-3-662-45921-8\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw10, author = {Sjouke Mauw}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols for Secret Santa (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {185--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_27}, doi = {10.1007/978-3-662-45921-8\_27}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MauwRR10, author = {Sjouke Mauw and Sasa Radomirovic and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Protocols for Secret Santa}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {175--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_26}, doi = {10.1007/978-3-662-45921-8\_26}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MauwRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MeierG10, author = {Jan Meier and Dieter Gollmann}, editor = {Bruce Christianson and James A. Malcolm}, title = {Caught in the Maze of Security Standards}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {3}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_2}, doi = {10.1007/978-3-662-45921-8\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MeierG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MortierMHMS10, author = {Richard Mortier and Anil Madhavapeddy and Theodore Hong and Derek Gordon Murray and Malte Schwarzkopf}, editor = {Bruce Christianson and James A. Malcolm}, title = {Using Dust Clouds to Enhance Anonymous Communication}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {54--59}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_10}, doi = {10.1007/978-3-662-45921-8\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MortierMHMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OrtolaniCC10, author = {Stefano Ortolani and Mauro Conti and Bruno Crispo}, editor = {Bruce Christianson and James A. Malcolm}, title = {Censorship-Resilient Communications through Information Scattering}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {82--89}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_14}, doi = {10.1007/978-3-662-45921-8\_14}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/OrtolaniCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe10, author = {Michael Roe}, editor = {Bruce Christianson and James A. Malcolm}, title = {Generating Channel Ids in Virtual World Operating Systems (Extended Abstract)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {71--73}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_12}, doi = {10.1007/978-3-662-45921-8\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe10a, author = {Michael Roe}, editor = {Bruce Christianson and James A. Malcolm}, title = {Censorship of eBooks (Extended Abstract)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {191--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_28}, doi = {10.1007/978-3-662-45921-8\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe10b, author = {Michael Roe}, editor = {Bruce Christianson and James A. Malcolm}, title = {Censorship of eBooks (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {200--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_29}, doi = {10.1007/978-3-662-45921-8\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan10, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Virtually Perfect Democracy (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {167--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_25}, doi = {10.1007/978-3-662-45921-8\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Schwarzkopf10, author = {Malte Schwarzkopf}, editor = {Bruce Christianson and James A. Malcolm}, title = {Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {60--70}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_11}, doi = {10.1007/978-3-662-45921-8\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Schwarzkopf10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Shafarenko10, author = {Alex Shafarenko}, editor = {Bruce Christianson and James A. Malcolm}, title = {Relay-Proof Channels Using {UWB} Lasers (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {47--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_9}, doi = {10.1007/978-3-662-45921-8\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Shafarenko10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Verissimo10, author = {Paulo Ver{\'{\i}}ssimo}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Made, Not Perfect, But Automatic}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {217--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_32}, doi = {10.1007/978-3-662-45921-8\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Verissimo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Verissimo10a, author = {Paulo Ver{\'{\i}}ssimo}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Made, Not Perfect, But Automatic (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {224--232}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_33}, doi = {10.1007/978-3-662-45921-8\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Verissimo10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan10, author = {Jeff Yan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Design in Human Computation Games (Transcript of Discussion)}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {154--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_23}, doi = {10.1007/978-3-662-45921-8\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuY10, author = {Su{-}Yang Yu and Jeff Yan}, editor = {Bruce Christianson and James A. Malcolm}, title = {Security Design in Human Computation Games}, booktitle = {Security Protocols {XVIII} - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7061}, pages = {142--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-662-45921-8\_22}, doi = {10.1007/978-3-662-45921-8\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YuY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2007, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17773-6}, doi = {10.1007/978-3-642-17773-6}, isbn = {978-3-642-17772-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson09, author = {Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Trust Economy of Brief Encounters}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {282--284}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_31}, doi = {10.1007/978-3-642-36213-2\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson09a, author = {Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Trust Economy of Brief Encounters}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {285--297}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_32}, doi = {10.1007/978-3-642-36213-2\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson09b, author = {Jonathan Anderson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Not That Kind of Friend}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {350--364}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_38}, doi = {10.1007/978-3-642-36213-2\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonS09, author = {Jonathan Anderson and Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Not That Kind of Friend}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {343--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_37}, doi = {10.1007/978-3-642-36213-2\_37}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArsacBCC09, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Attacking Each Other}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {41--47}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_7}, doi = {10.1007/978-3-642-36213-2\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArsacBCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Backes09, author = {Michael Backes}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Design and Verification of Anonymous Trust Protocols}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {149--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_18}, doi = {10.1007/978-3-642-36213-2\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Backes09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BackesM09, author = {Michael Backes and Matteo Maffei}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Design and Verification of Anonymous Trust Protocols}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {143--148}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_17}, doi = {10.1007/978-3-642-36213-2\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BackesM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BangerterBKS0T09, author = {Endre Bangerter and Stefania Barzan and Stephan Krenn and Ahmad{-}Reza Sadeghi and Thomas Schneider and Joe{-}Kai Tsay}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Bringing Zero-Knowledge Proofs of Knowledge to Practice}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {51--62}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_9}, doi = {10.1007/978-3-642-36213-2\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/BangerterBKS0T09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze09, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Is the Honeymoon over?}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {28--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_5}, doi = {10.1007/978-3-642-36213-2\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze09a, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Below the Salt}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {34--40}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_6}, doi = {10.1007/978-3-642-36213-2\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeM09, author = {Matt Blaze and Patrick D. McDaniel}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Below the Salt}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {24--27}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_4}, doi = {10.1007/978-3-642-36213-2\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau09, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Alice and Bob in Love}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {189--198}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_23}, doi = {10.1007/978-3-642-36213-2\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau09a, author = {Joseph Bonneau}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Alice and Bob in Love}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {199--212}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_24}, doi = {10.1007/978-3-642-36213-2\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Card09, author = {Orson Scott Card}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Final Word}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {365}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_39}, doi = {10.1007/978-3-642-36213-2\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Card09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chantry09, author = {Xavier Chantry}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Attacking Each Other}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {48--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_8}, doi = {10.1007/978-3-642-36213-2\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chantry09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson09, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Introduction: Brief Encounters}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {1--2}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_1}, doi = {10.1007/978-3-642-36213-2\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson09a, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Trust*: Using Local Guarantees to Extend the Reach of Trust}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {179--188}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_22}, doi = {10.1007/978-3-642-36213-2\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkeCX09, author = {Stephen William Clarke and Bruce Christianson and Hannan Xiao}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Trust*: Using Local Guarantees to Extend the Reach of Trust}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {171--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_21}, doi = {10.1007/978-3-642-36213-2\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkeCX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis09, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {87--92}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_13}, doi = {10.1007/978-3-642-36213-2\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis09a, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {The Least Privacy-Damaging Centralised Traffic Data Retention Architecture}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {93--110}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_14}, doi = {10.1007/978-3-642-36213-2\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley09, author = {Simon N. Foley}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Qualitative Analysis for Trust Management}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {308--320}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_34}, doi = {10.1007/978-3-642-36213-2\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Foley09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyR09, author = {Simon N. Foley and Vivien M. Rooney}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Qualitative Analysis for Trust Management}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {298--307}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_33}, doi = {10.1007/978-3-642-36213-2\_33}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FoleyR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor09, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Brief Encounters with a Random Key Graph}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {162--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_20}, doi = {10.1007/978-3-642-36213-2\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorPZ09, author = {Virgil D. Gligor and Adrian Perrig and Jun Zhao}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Brief Encounters with a Random Key Graph}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {157--161}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_19}, doi = {10.1007/978-3-642-36213-2\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Krenn09, author = {Stephan Krenn}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Bringing Zero-Knowledge Proofs of Knowledge to Practice}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {63--68}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_10}, doi = {10.1007/978-3-642-36213-2\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Krenn09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KurMS09, author = {Jir{\'{\i}} Kur and V{\'{a}}clav Maty{\'{a}}s and Petr Svenda}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Evolutionary Design of Attack Strategies}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {3--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_2}, doi = {10.1007/978-3-642-36213-2\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KurMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Meadows09, author = {Catherine Meadows}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Deriving Ephemeral Authentication Using Channel Axioms}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {262--268}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_28}, doi = {10.1007/978-3-642-36213-2\_28}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Meadows09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell09, author = {Chris J. Mitchell}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {A Novel Stateless Authentication Protocol}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {269--274}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_29}, doi = {10.1007/978-3-642-36213-2\_29}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell09a, author = {Chris J. Mitchell}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {A Novel Stateless Authentication Protocol}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {275--281}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_30}, doi = {10.1007/978-3-642-36213-2\_30}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mukhamedov09, author = {Aybek Mukhamedov}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Towards a Verified Reference Implementation of a Trusted Platform Module}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {82--86}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_12}, doi = {10.1007/978-3-642-36213-2\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mukhamedov09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MukhamedovGR09, author = {Aybek Mukhamedov and Andrew D. Gordon and Mark Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Towards a Verified Reference Implementation of a Trusted Platform Module}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {69--81}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_11}, doi = {10.1007/978-3-642-36213-2\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/MukhamedovGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PavlovicM09, author = {Dusko Pavlovic and Catherine Meadows}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Deriving Ephemeral Authentication Using Channel Axioms}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {240--261}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_27}, doi = {10.1007/978-3-642-36213-2\_27}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PavlovicM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Preibusch09, author = {S{\"{o}}ren Preibusch}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Establishing Distributed Hidden Friendship Relations}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {335--342}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_36}, doi = {10.1007/978-3-642-36213-2\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Preibusch09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PreibuschB09, author = {S{\"{o}}ren Preibusch and Alastair R. Beresford}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Establishing Distributed Hidden Friendship Relations}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {321--334}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_35}, doi = {10.1007/978-3-642-36213-2\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PreibuschB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan09, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Pretty Good Democracy}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {131--142}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_16}, doi = {10.1007/978-3-642-36213-2\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanT09, author = {Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Pretty Good Democracy}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {111--130}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_15}, doi = {10.1007/978-3-642-36213-2\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Svenda09, author = {Petr Svenda}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Evolutionary Design of Attack Strategies}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {18--23}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_3}, doi = {10.1007/978-3-642-36213-2\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Svenda09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Syverson09, author = {Paul Syverson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Why I'm Not an Entropist}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {213--230}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_25}, doi = {10.1007/978-3-642-36213-2\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Syverson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Syverson09a, author = {Paul Syverson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Why I'm Not an Entropist}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {231--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_26}, doi = {10.1007/978-3-642-36213-2\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Syverson09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2006, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04904-0}, doi = {10.1007/978-3-642-04904-0}, isbn = {978-3-642-04903-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson08, author = {Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {What Next After Anonymity? (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {223--231}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_30}, doi = {10.1007/978-3-642-22137-8\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonM08, author = {Ross J. Anderson and Steven J. Murdoch}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {What Next after Anonymity?}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {220--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_29}, doi = {10.1007/978-3-642-22137-8\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BahariG08, author = {S. Farshad Bahari and Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Handling New Adversaries in Wireless Ad-Hoc Networks}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {118--119}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_17}, doi = {10.1007/978-3-642-22137-8\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BahariG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze08, author = {Matt Blaze}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {244--255}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_34}, doi = {10.1007/978-3-642-22137-8\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeC08, author = {Matt Blaze and Sandy Clark}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {241--243}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_33}, doi = {10.1007/978-3-642-22137-8\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenLM08, author = {Haibo Chen and Jun Li and Wenbo Mao}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {107--114}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_15}, doi = {10.1007/978-3-642-22137-8\_15}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ChenLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson08, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Remodelling the Attacker (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {1--2}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_1}, doi = {10.1007/978-3-642-22137-8\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson08a, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Security Protocol Deployment Risk (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {21--24}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_4}, doi = {10.1007/978-3-642-22137-8\_4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekD08, author = {Daniel Cvrcek and George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Fighting the 'Good' Internet War}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {3--11}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_2}, doi = {10.1007/978-3-642-22137-8\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis08, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Covert Communications Despite Traffic Data Retention}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {198--214}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_27}, doi = {10.1007/978-3-642-22137-8\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis08a, author = {George Danezis}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Covert Communications Despite Traffic Data Retention (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {215--219}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_28}, doi = {10.1007/978-3-642-22137-8\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyBB08, author = {Simon N. Foley and Giampaolo Bella and Stefano Bistarelli}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Security Protocol Deployment Risk}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {12--20}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_3}, doi = {10.1007/978-3-642-22137-8\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor08, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {120--125}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_18}, doi = {10.1007/978-3-642-22137-8\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann08, author = {Dieter Gollmann}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Problems with Same Origin Policy - Know Thyself}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {84--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_11}, doi = {10.1007/978-3-642-22137-8\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann08a, author = {Dieter Gollmann}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Problems with Same Origin Policy (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {86--92}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_12}, doi = {10.1007/978-3-642-22137-8\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao08, author = {Feng Hao}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Password Authenticated Key Exchange by Juggling (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {172--179}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_24}, doi = {10.1007/978-3-642-22137-8\_24}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoR08, author = {Feng Hao and Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Password Authenticated Key Exchange by Juggling}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {159--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_23}, doi = {10.1007/978-3-642-22137-8\_23}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Johnson08, author = {Matthew Johnson}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {A Real World Application of Secure Multi-party Computations (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {191--197}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_26}, doi = {10.1007/978-3-642-22137-8\_26}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Johnson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JohnsonO08, author = {Matthew Johnson and Ralph Owen}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {180--190}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_25}, doi = {10.1007/978-3-642-22137-8\_25}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JohnsonO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Krhovjak08, author = {Jan Krhovjak}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Generating Random Numbers in Hostile Environments (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {51--53}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_8}, doi = {10.1007/978-3-642-22137-8\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Krhovjak08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KrhovjakSM08, author = {Jan Krhovjak and Andriy Stetsko and Vashek Matyas}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Generating Random Numbers in Hostile Environments}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {38--50}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_7}, doi = {10.1007/978-3-642-22137-8\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KrhovjakSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao08, author = {Wenbo Mao}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {115--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_16}, doi = {10.1007/978-3-642-22137-8\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Meier08, author = {Jan Meier}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Do Not Model the Attacker}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {25--35}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_5}, doi = {10.1007/978-3-642-22137-8\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Meier08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Meier08a, author = {Jan Meier}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Do Not Model the Attacker (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {36--37}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_6}, doi = {10.1007/978-3-642-22137-8\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Meier08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murdoch08, author = {Steven J. Murdoch}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Hardened Stateless Session Cookies}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {93--101}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_13}, doi = {10.1007/978-3-642-22137-8\_13}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murdoch08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Murdoch08a, author = {Steven J. Murdoch}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Hardened Stateless Session Cookies (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {102--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_14}, doi = {10.1007/978-3-642-22137-8\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Murdoch08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nikander08, author = {Pekka Nikander}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {156--158}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_22}, doi = {10.1007/978-3-642-22137-8\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nikander08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NikanderM08, author = {Pekka Nikander and Giannis F. Marias}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Towards Understanding Pure Publish/Subscribe Cryptographic Protocols}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {144--155}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_21}, doi = {10.1007/978-3-642-22137-8\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NikanderM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe08, author = {Michael Roe}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Problems of Provenance for Digital Libraries}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {126--133}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_19}, doi = {10.1007/978-3-642-22137-8\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe08a, author = {Michael Roe}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Problems of Provenance for Digital Libraries (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {134--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_20}, doi = {10.1007/978-3-642-22137-8\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan08, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Remodelling the Attacker in Voting Protocols}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {232--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_31}, doi = {10.1007/978-3-642-22137-8\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan08a, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Remodelling the Attacker in Voting Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {235--240}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_32}, doi = {10.1007/978-3-642-22137-8\_32}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano08, author = {Frank Stajano}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Cyberdice (Transcript of Discussion)}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {71--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_10}, doi = {10.1007/978-3-642-22137-8\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoC08, author = {Frank Stajano and Richard Clayton}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters}, booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6615}, pages = {54--70}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-22137-8\_9}, doi = {10.1007/978-3-642-22137-8\_9}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StajanoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AdidaBCLAR07, author = {Ben Adida and Mike Bond and Jolyon Clulow and Amerson Lin and Ross J. Anderson and Ronald L. Rivest}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On the Security of the {EMV} Secure Messaging {API} (Extended Abstract)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {147--149}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_17}, doi = {10.1007/978-3-642-17773-6\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/AdidaBCLAR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AuraBRZ07, author = {Tuomas Aura and Moritz Becker and Michael Roe and Piotr Zielinski}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Reconciling Multiple IPsec and Firewall Policies}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {81--97}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_9}, doi = {10.1007/978-3-642-17773-6\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AuraBRZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson07, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {When Is a Protocol Broken? (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {1--2}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_1}, doi = {10.1007/978-3-642-17773-6\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson07a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {139--146}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_16}, doi = {10.1007/978-3-642-17773-6\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonCMR07, author = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Instructions to Reviewers}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {256}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_30}, doi = {10.1007/978-3-642-17773-6\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonCMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonL07, author = {Bruce Christianson and Jun Li}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Multi-Channel Key Agreement Using Encrypted Public Key Exchange}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {133--138}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_15}, doi = {10.1007/978-3-642-17773-6\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clulow07, author = {Jolyon Clulow}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On the Security of the {EMV} Secure Messaging {API} (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {150--151}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_18}, doi = {10.1007/978-3-642-17773-6\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clulow07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clulow07a, author = {Jolyon Clulow}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Robbing the Bank with a Theorem Prover - (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {172--177}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_22}, doi = {10.1007/978-3-642-17773-6\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clulow07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis07, author = {George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Private Yet Abuse Resistant Open Publishing (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {244--255}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_29}, doi = {10.1007/978-3-642-17773-6\_29}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Danezis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/DanezisL07, author = {George Danezis and Ben Laurie}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Private Yet Abuse Resistant Open Publishing}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {222--243}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_28}, doi = {10.1007/978-3-642-17773-6\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/DanezisL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Granado07, author = {Marcus C. Granado}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Resiliency Aspects of Security Protocols}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {37--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_6}, doi = {10.1007/978-3-642-17773-6\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Granado07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hoepman07, author = {Jaap{-}Henk Hoepman}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Distributed Double Spending Prevention}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {152--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_19}, doi = {10.1007/978-3-642-17773-6\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hoepman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hoepman07a, author = {Jaap{-}Henk Hoepman}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Distributed Double Spending Prevention (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {166--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_20}, doi = {10.1007/978-3-642-17773-6\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hoepman07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KataokaUHY07, author = {Haruno Kataoka and Akira Utsumi and Yuki Hirose and Hiroshi Yoshiura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {178--188}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_23}, doi = {10.1007/978-3-642-17773-6\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KataokaUHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lin07, author = {Amerson Lin}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modeling Partial Attacks with Alloy (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {34--36}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_5}, doi = {10.1007/978-3-642-17773-6\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LinBC07, author = {Amerson Lin and Mike Bond and Jolyon Clulow}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modeling Partial Attacks with Alloy}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {20--33}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_4}, doi = {10.1007/978-3-642-17773-6\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LinBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MaoYYC07, author = {Wenbo Mao and Fei Yan and Chuanjiang Yi and Haibo Chen}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {204--221}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_27}, doi = {10.1007/978-3-642-17773-6\_27}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/MaoYYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nagaraja07, author = {Shishir Nagaraja}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy Amplification with Social Networks}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {58--73}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_7}, doi = {10.1007/978-3-642-17773-6\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nagaraja07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nagaraja07a, author = {Shishir Nagaraja}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy Amplification with Social Networks (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {74--80}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_8}, doi = {10.1007/978-3-642-17773-6\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nagaraja07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe07, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {98--103}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_10}, doi = {10.1007/978-3-642-17773-6\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Sherr07, author = {Micah Sherr}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Measurable Security through Isotropic Channels (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {13--19}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_3}, doi = {10.1007/978-3-642-17773-6\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Sherr07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SherrCB07, author = {Micah Sherr and Eric Cronin and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Measurable Security through Isotropic Channels}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {3--12}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_2}, doi = {10.1007/978-3-642-17773-6\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SherrCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Tjostheim07, author = {Thomas Tj{\o}stheim}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Model for System-Based Analysis of Voting Systems (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {131--132}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_14}, doi = {10.1007/978-3-642-17773-6\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Tjostheim07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/TjostheimPR07, author = {Thomas Tj{\o}stheim and Thea Peacock and Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Model for System-Based Analysis of Voting Systems}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {114--130}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_13}, doi = {10.1007/978-3-642-17773-6\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/TjostheimPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yasinsac07, author = {Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards Working with Small Atomic Functions - (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {201--203}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_26}, doi = {10.1007/978-3-642-17773-6\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yasinsac07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YasinsacM07, author = {Alec Yasinsac and Jeffrey Todd McDonald}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards Working with Small Atomic Functions}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {191--200}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_25}, doi = {10.1007/978-3-642-17773-6\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YasinsacM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yoshiura07, author = {Hiroshi Yoshiura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {189--190}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_24}, doi = {10.1007/978-3-642-17773-6\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yoshiura07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YounABCHLRA07, author = {Paul Youn and Ben Adida and Mike Bond and Jolyon Clulow and Jonathan Herzog and Amerson Lin and Ronald L. Rivest and Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Robbing the Bank with a Theorem Prover - (Abstract)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {171}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_21}, doi = {10.1007/978-3-642-17773-6\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YounABCHLRA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Zugenmaier07, author = {Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Anchor-Less Secure Session Mobility (Transcript of Discussion)}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {110--113}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_12}, doi = {10.1007/978-3-642-17773-6\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Zugenmaier07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ZugenmaierLPS07, author = {Alf Zugenmaier and Julien Laganier and Anand R. Prasad and Kristian Slavov}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Anchor-Less Secure Session Mobility}, booktitle = {Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5964}, pages = {104--109}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-17773-6\_11}, doi = {10.1007/978-3-642-17773-6\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ZugenmaierLPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2005, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77156-2}, doi = {10.1007/978-3-540-77156-2}, isbn = {978-3-540-77155-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AdidaBCLMAR06, author = {Ben Adida and Mike Bond and Jolyon Clulow and Amerson Lin and Steven J. Murdoch and Ross J. Anderson and Ronald L. Rivest}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Phish and Chips}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {40--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_7}, doi = {10.1007/978-3-642-04904-0\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AdidaBCLMAR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson06, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Man-in-the-Middle Defence}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {157--163}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_21}, doi = {10.1007/978-3-642-04904-0\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonB06, author = {Ross J. Anderson and Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Man-in-the-Middle Defence}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {153--156}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_20}, doi = {10.1007/978-3-642-04904-0\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Beresford06, author = {Alastair R. Beresford}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy-Sensitive Congestion Charging}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {105--111}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_14}, doi = {10.1007/978-3-642-04904-0\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Beresford06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BeresfordDH06, author = {Alastair R. Beresford and Jonathan J. Davies and Robert K. Harle}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy-Sensitive Congestion Charging}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {97--104}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_13}, doi = {10.1007/978-3-642-04904-0\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BeresfordDH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze06, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Composing Security Metrics}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {3--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_2}, doi = {10.1007/978-3-642-04904-0\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bond06, author = {Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Phish and Chips}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {49--51}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_8}, doi = {10.1007/978-3-642-04904-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bond06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson06, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in the Protocol}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {1--2}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_1}, doi = {10.1007/978-3-642-04904-0\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonS06, author = {Bruce Christianson and Alexander V. Shafarenko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Vintage Bit Cryptography}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {261--265}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_34}, doi = {10.1007/978-3-642-04904-0\_34}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekKMD06, author = {Daniel Cvrcek and Marek Kumpost and Vashek Matyas and George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Value of Location Information}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {112--121}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_15}, doi = {10.1007/978-3-642-04904-0\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekKMD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gentry06, author = {Craig Gentry}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Distributed Human Computation}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {181--189}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_25}, doi = {10.1007/978-3-642-04904-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gentry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GentryRS06, author = {Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Distributed Human Computation}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {177--180}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_24}, doi = {10.1007/978-3-642-04904-0\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GentryRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao06, author = {Feng Hao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A 2-Round Anonymous Veto Protocol}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {212--214}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_29}, doi = {10.1007/978-3-642-04904-0\_29}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoZ06, author = {Feng Hao and Piotr Zielinski}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A 2-Round Anonymous Veto Protocol}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {202--211}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_28}, doi = {10.1007/978-3-642-04904-0\_28}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Heather06, author = {James Heather}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Where Next for Formal Methods?}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {59--61}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_10}, doi = {10.1007/978-3-642-04904-0\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Heather06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HeatherW06, author = {James Heather and Kun Wei}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Where Next for Formal Methods?}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {52--58}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_9}, doi = {10.1007/978-3-642-04904-0\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HeatherW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Johnson06, author = {Matthew Johnson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Usability of Security Management: Defining the Permissions of Guests}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {284--285}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_37}, doi = {10.1007/978-3-642-04904-0\_37}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Johnson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JohnsonS06, author = {Matthew Johnson and Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Usability of Security Management: Defining the Permissions of Guests}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {276--283}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_36}, doi = {10.1007/978-3-642-04904-0\_36}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JohnsonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lim06, author = {Hoon Wei Lim}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secret Public Key Protocols Revisited}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {257--260}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_33}, doi = {10.1007/978-3-642-04904-0\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lim06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LimP06, author = {Hoon Wei Lim and Kenneth G. Paterson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secret Public Key Protocols Revisited}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {237--256}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_32}, doi = {10.1007/978-3-642-04904-0\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LimP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao06, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Innovations for Grid Security from Trusted Computing}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {150--152}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_19}, doi = {10.1007/978-3-642-04904-0\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MaoMJZ06, author = {Wenbo Mao and Andrew P. Martin and Hai Jin and Huanguo Zhang}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Innovations for Grid Security from Trusted Computing}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {132--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_18}, doi = {10.1007/978-3-642-04904-0\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MaoMJZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Matyas06, author = {Vashek Matyas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Value of Location Information}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {122--127}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_16}, doi = {10.1007/978-3-642-04904-0\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Matyas06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Matyas06a, author = {Vashek Matyas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Update on {PIN} or Signature}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {128--131}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_17}, doi = {10.1007/978-3-642-04904-0\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Matyas06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell06, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {164--170}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_22}, doi = {10.1007/978-3-642-04904-0\_22}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell06a, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {171--176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_23}, doi = {10.1007/978-3-642-04904-0\_23}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MyrvangS06, author = {Per Harald Myrvang and Tage Stabell{-}Kul{\o}}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Cordial Security Protocol Programming}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {62--84}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_11}, doi = {10.1007/978-3-642-04904-0\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MyrvangS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nair06, author = {Srijith K. Nair}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Secure Application-Semantic Aware Policy Enforcement Architecture}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {32--39}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_6}, doi = {10.1007/978-3-642-04904-0\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nair06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NairCT06, author = {Srijith K. Nair and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Secure Application-Semantic Aware Policy Enforcement Architecture}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {26--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_5}, doi = {10.1007/978-3-642-04904-0\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NairCT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OGorman06, author = {Lawrence O'Gorman}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {How to Speak an Authentication Secret Securely from an Eavesdropper}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {230--236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_31}, doi = {10.1007/978-3-642-04904-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/OGorman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OGormanBS06, author = {Lawrence O'Gorman and Lynne Shapiro Brotman and Michael J. Sammon}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {How to Speak an Authentication Secret Securely from an Eavesdropper}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {215--229}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_30}, doi = {10.1007/978-3-642-04904-0\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/OGormanBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan06, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in Voting Protocols}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {20--25}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_4}, doi = {10.1007/978-3-642-04904-0\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanP06, author = {Peter Y. A. Ryan and Thea Peacock}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in Voting Protocols}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {13--19}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_3}, doi = {10.1007/978-3-642-04904-0\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Shafarenko06, author = {Alexander V. Shafarenko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Vintage Bit Cryptography}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {266--275}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_35}, doi = {10.1007/978-3-642-04904-0\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Shafarenko06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stabell-Kulo06, author = {Tage Stabell{-}Kul{\o}}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Cordial Security Protocol Programming}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {85--96}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_12}, doi = {10.1007/978-3-642-04904-0\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stabell-Kulo06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/X06, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Eve - The Last Word}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {286}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_38}, doi = {10.1007/978-3-642-04904-0\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/X06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan06, author = {Jeff Yan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Bot, Cyborg and Automated Turing Test}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {190--197}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_26}, doi = {10.1007/978-3-642-04904-0\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan06a, author = {Jeff Yan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Bot, Cyborg and Automated Turing Test}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {198--201}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_27}, doi = {10.1007/978-3-642-04904-0\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2004, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11861386}, doi = {10.1007/11861386}, isbn = {3-540-40925-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson05, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Initial Costs and Maintenance Costs of Protocols}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {333--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_42}, doi = {10.1007/978-3-540-77156-2\_42}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson05a, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Initial Costs and Maintenance Costs of Protocols}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {336--343}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_43}, doi = {10.1007/978-3-540-77156-2\_43}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArkkoNN05, author = {Jari Arkko and Pekka Nikander and Mats N{\"{a}}slund}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enhancing Privacy with Shared Pseudo Random Sequences}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {187--196}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_22}, doi = {10.1007/978-3-540-77156-2\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArkkoNN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Aura05, author = {Tuomas Aura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Experiences with Host-to-Host IPsec}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {23--30}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_3}, doi = {10.1007/978-3-540-77156-2\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Aura05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AuraRM05, author = {Tuomas Aura and Michael Roe and Anish Mohammed}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Experiences with Host-to-Host IPsec}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {3--22}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_2}, doi = {10.1007/978-3-540-77156-2\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AuraRM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze05, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Listen Too Closely and You May Be Confused}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {250--257}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_31}, doi = {10.1007/978-3-540-77156-2\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bond05, author = {Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dining Freemasons (Security Protocols for Secret Societies)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {266--275}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_33}, doi = {10.1007/978-3-540-77156-2\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bond05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BondD05, author = {Mike Bond and George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dining Freemasons (Security Protocols for Secret Societies)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {258--265}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_32}, doi = {10.1007/978-3-540-77156-2\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BondD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterMY05, author = {Mike Burmester and Breno de Medeiros and Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Community-Centric Vanilla-Rollback Access, or: How {I} Stopped Worrying and Learned to Love My Computer}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {228--237}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_28}, doi = {10.1007/978-3-540-77156-2\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterMY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenLM05, author = {Liqun Chen and Hoon Wei Lim and Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {User-Friendly Grid Security Architecture and Protocols}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {139--156}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_17}, doi = {10.1007/978-3-540-77156-2\_17}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChenLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChowdhuryCM05, author = {Partha Das Chowdhury and Bruce Christianson and James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Anonymous Context Based Role Activation Mechanism}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {315--321}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_39}, doi = {10.1007/978-3-540-77156-2\_39}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChowdhuryCM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson05, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The System Likes You}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {1--2}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_1}, doi = {10.1007/978-3-540-77156-2\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson05a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Anonymous Context Based Role Activation Mechanism}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {322--328}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_40}, doi = {10.1007/978-3-540-77156-2\_40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clayton05, author = {Richard Clayton}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {82--88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_10}, doi = {10.1007/978-3-540-77156-2\_10}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Clayton05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Clayton05a, author = {Richard Clayton}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {89--96}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_11}, doi = {10.1007/978-3-540-77156-2\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Clayton05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CroninSB05, author = {Eric Cronin and Micah Sherr and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Listen Too Closely and You May Be Confused}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {245--249}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_30}, doi = {10.1007/978-3-540-77156-2\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CroninSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekKM05, author = {Daniel Cvrcek and Jan Krhovjak and Vashek Matyas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{PIN} (and Chip) or Signature: Beating the Cheating?}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {69--75}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_8}, doi = {10.1007/978-3-540-77156-2\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekKM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt05, author = {Yvo Desmedt}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Understanding Why Some Network Protocols Are User-Unfriendly}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {215--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_26}, doi = {10.1007/978-3-540-77156-2\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Desmedt05a, author = {Yvo Desmedt}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Understanding Why Some Network Protocols Are User-Unfriendly}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {220--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_27}, doi = {10.1007/978-3-540-77156-2\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Desmedt05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley05, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Authorisation Subterfuge by Delegation in Decentralised Networks}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {103--111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_13}, doi = {10.1007/978-3-540-77156-2\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Foley05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyZ05, author = {Simon N. Foley and Hongbin Zhou}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Authorisation Subterfuge by Delegation in Decentralised Networks}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {97--102}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_12}, doi = {10.1007/978-3-540-77156-2\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FoleyZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor05, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {276--283}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_34}, doi = {10.1007/978-3-540-77156-2\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gordon05, author = {John Gordon}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Alice and Bob}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {344--345}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_44}, doi = {10.1007/978-3-540-77156-2\_44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gordon05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GunawardenaSZD05, author = {Dinan Gunawardena and Jacob Scott and Alf Zugenmaier and Austin Donnelly}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Countering Automated Exploits with System Security {CAPTCHAS}}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {162--169}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_19}, doi = {10.1007/978-3-540-77156-2\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GunawardenaSZD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao05, author = {Feng Hao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Combining Crypto with Biometrics: {A} New Human-Security Interface}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {133--138}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_16}, doi = {10.1007/978-3-540-77156-2\_16}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Johnson05, author = {Matthew Johnson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Implementing a Multi-hat {PDA}}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {308--314}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_38}, doi = {10.1007/978-3-540-77156-2\_38}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Johnson05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JohnsonS05, author = {Matthew Johnson and Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Implementing a Multi-hat {PDA}}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {295--307}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_37}, doi = {10.1007/978-3-540-77156-2\_37}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JohnsonS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Laurie05, author = {Ben Laurie}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Safer Scripting Through Precompilation}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {284--288}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_35}, doi = {10.1007/978-3-540-77156-2\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Laurie05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Laurie05a, author = {Ben Laurie}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Safer Scripting Through Precompilation}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {289--294}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_36}, doi = {10.1007/978-3-540-77156-2\_36}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Laurie05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lim05, author = {Hoon Wei Lim}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {User-Friendly Grid Security Architecture and Protocols}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {157--161}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_18}, doi = {10.1007/978-3-540-77156-2\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lim05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas05, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The System Likes You?}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {180--186}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_21}, doi = {10.1007/978-3-540-77156-2\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Matyas05, author = {Vashek Matyas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{PIN} (and Chip) or Signature: Beating the Cheating?}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {76--81}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_9}, doi = {10.1007/978-3-540-77156-2\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Matyas05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Medeiros05, author = {Breno de Medeiros}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Community-Centric Vanilla-Rollback Access, or: How {I} Stopped Worrying and Learned to Love My Computer}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {238--244}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_29}, doi = {10.1007/978-3-540-77156-2\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Medeiros05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nagaraja05, author = {Shishir Nagaraja}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Topology of Covert Conflict}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {329--332}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_41}, doi = {10.1007/978-3-540-77156-2\_41}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nagaraja05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nikander05, author = {Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enhancing Privacy with Shared Pseudo Random Sequences}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {197--203}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_23}, doi = {10.1007/978-3-540-77156-2\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nikander05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Rieback05, author = {Melanie R. Rieback}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keep on Blockin' in the Free World}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {60--68}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_7}, doi = {10.1007/978-3-540-77156-2\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Rieback05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RiebackCT05, author = {Melanie R. Rieback and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keep on Blockin' in the Free World: Personal Access Control for Low-Cost {RFID} Tags}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {51--59}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_6}, doi = {10.1007/978-3-540-77156-2\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RiebackCT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe05, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Non-repudiation and the Metaphysics of Presence}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {204--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_24}, doi = {10.1007/978-3-540-77156-2\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe05a, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Non-repudiation and the Metaphysics of Presence}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {207--214}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_25}, doi = {10.1007/978-3-540-77156-2\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano05, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Repairing the Bluetooth Pairing Protocol}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {46--50}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_5}, doi = {10.1007/978-3-540-77156-2\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wong05, author = {Ford{-}Long Wong}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Multi-channel Protocols}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {128--132}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_15}, doi = {10.1007/978-3-540-77156-2\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wong05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WongS05, author = {Ford{-}Long Wong and Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Multi-channel Protocols}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {112--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_14}, doi = {10.1007/978-3-540-77156-2\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WongS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WongSC05, author = {Ford{-}Long Wong and Frank Stajano and Jolyon Clulow}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Repairing the Bluetooth Pairing Protocol}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {31--45}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_4}, doi = {10.1007/978-3-540-77156-2\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WongSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Zugenmaier05, author = {Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Countering Automated Exploits with System Security {CAPTCHAS}}, booktitle = {Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4631}, pages = {170--179}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-77156-2\_20}, doi = {10.1007/978-3-540-77156-2\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Zugenmaier05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2003, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11542322}, doi = {10.1007/11542322}, isbn = {3-540-28389-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson04, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dancing Bear: {A} New Way of Composing Ciphers}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {231--238}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_26}, doi = {10.1007/11861386\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson04a, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Dancing Bear: {A} New Way of Composing Ciphers (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {239--245}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_27}, doi = {10.1007/11861386\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Aura04, author = {Tuomas Aura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy, Control and Internet Mobility (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {146--150}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_15}, doi = {10.1007/11861386\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Aura04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AuraZ04, author = {Tuomas Aura and Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy, Control and Internet Mobility}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {133--145}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_14}, doi = {10.1007/11861386\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AuraZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bangerter04, author = {Endre Bangerter}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {43--50}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_5}, doi = {10.1007/11861386\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bangerter04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BangerterCL04, author = {Endre Bangerter and Jan Camenisch and Anna Lysyanskaya}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Cryptographic Framework for the Controlled Release of Certified Data}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {20--42}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_4}, doi = {10.1007/11861386\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BangerterCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze04, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Toward a Broader View of Security Protocols}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {106--120}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_12}, doi = {10.1007/11861386\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze04a, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Toward a Broader View of Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {121--132}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_13}, doi = {10.1007/11861386\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BohmLMMZ04, author = {Denis Bohm and Mik Lamming and Robert N. Mayo and Jeff Morgan and Kan Zhang}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Controlling Who Tracks Me}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {151--154}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_16}, doi = {10.1007/11861386\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BohmLMMZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterDWY04, author = {Mike Burmester and Yvo Desmedt and Rebecca N. Wright and Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Accountable Privacy}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {83--95}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_10}, doi = {10.1007/11861386\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterDWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bussard04, author = {Laurent Bussard}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Establishing Trust with Privacy (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {210--212}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_23}, doi = {10.1007/11861386\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bussard04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BussardM04, author = {Laurent Bussard and Refik Molva}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Establishing Trust with Privacy}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {199--209}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_22}, doi = {10.1007/11861386\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BussardM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChowdhuryCM04, author = {Partha Das Chowdhury and Bruce Christianson and James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Anonymous Authentication}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {299--305}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_36}, doi = {10.1007/11861386\_36}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChowdhuryCM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson04, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Introduction: Authentic Privacy}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {1--3}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_1}, doi = {10.1007/11861386\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson04a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Anonymous Authentication (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {306--311}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_37}, doi = {10.1007/11861386\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Cvrcek04, author = {Daniel Cvrcek}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {275}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_32}, doi = {10.1007/11861386\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Cvrcek04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekM04, author = {Daniel Cvrcek and V{\'{a}}clav Maty{\'{a}}s Jr.}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Pseudonymity in the Light of Evidence-Based Trust}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {267--274}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_31}, doi = {10.1007/11861386\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Eronen04, author = {Pasi Eronen}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {78--82}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_9}, doi = {10.1007/11861386\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Eronen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/EronenA04, author = {Pasi Eronen and Jari Arkko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Authentication Components: Engineering Experiences and Guidelines}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {68--77}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_8}, doi = {10.1007/11861386\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/EronenA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor04, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {256--266}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_30}, doi = {10.1007/11861386\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann04, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Identity and Location}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {246--250}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_28}, doi = {10.1007/11861386\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann04a, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Identity and Location (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {251--255}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_29}, doi = {10.1007/11861386\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hashimoto04, author = {Mikio Hashimoto}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {287--290}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_34}, doi = {10.1007/11861386\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hashimoto04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HashimotoHK04, author = {Mikio Hashimoto and Hiroyoshi Haruki and Takeshi Kawabata}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {276--286}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_33}, doi = {10.1007/11861386\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HashimotoHK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas04, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Why Are We Authenticating (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {291--298}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_35}, doi = {10.1007/11861386\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Massacci04, author = {Fabio Massacci}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy is Linking Permission to Purpose (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {192--198}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_21}, doi = {10.1007/11861386\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Massacci04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciZ04, author = {Fabio Massacci and Nicola Zannone}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy Is Linking Permission to Purpose}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {179--191}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_20}, doi = {10.1007/11861386\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mayo04, author = {Robert N. Mayo}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Controlling Who Tracks Me (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {155--162}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_17}, doi = {10.1007/11861386\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mayo04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell04, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Limits to Anonymity When Using Credentials (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {13--19}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_3}, doi = {10.1007/11861386\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PashalidisM04, author = {Andreas Pashalidis and Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Limits to Anonymity When Using Credentials}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {4--12}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_2}, doi = {10.1007/11861386\_2}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PashalidisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Popescu04, author = {Bogdan C. Popescu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {221--230}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_25}, doi = {10.1007/11861386\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Popescu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PopescuCT04, author = {Bogdan C. Popescu and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {213--220}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_24}, doi = {10.1007/11861386\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PopescuCT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Rissanen04, author = {Erik Rissanen}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {320--323}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_39}, doi = {10.1007/11861386\_39}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Rissanen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RissanenFS04, author = {Erik Rissanen and Babak Sadighi Firozabadi and Marek J. Sergot}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Mechanism for Discretionary Overriding of Access Control}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {312--319}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_38}, doi = {10.1007/11861386\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RissanenFS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano04, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable {PDA}}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {51--64}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_6}, doi = {10.1007/11861386\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano04a, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {65--67}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_7}, doi = {10.1007/11861386\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wheeler04, author = {David Wheeler}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Last Orders}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {324}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_40}, doi = {10.1007/11861386\_40}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wheeler04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wright04, author = {Rebecca N. Wright}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Accountable Privacy (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {96--105}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_11}, doi = {10.1007/11861386\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wright04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ylitalo04, author = {Jukka Ylitalo}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{BLIND:} {A} Complete Identity Protection Framework for End-Points (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {177--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_19}, doi = {10.1007/11861386\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ylitalo04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YlitaloN04, author = {Jukka Ylitalo and Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{BLIND:} {A} Complete Identity Protection Framework for End-Points}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {163--176}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_18}, doi = {10.1007/11861386\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YlitaloN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2002, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b94819}, doi = {10.1007/B94819}, isbn = {3-540-20830-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson03, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {What We Can Learn from {API} Security}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {288--300}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_35}, doi = {10.1007/11542322\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Arkko03, author = {Jari Arkko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Limitations of IPsec Policy Mechanisms (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {252--254}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_30}, doi = {10.1007/11542322\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Arkko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArkkoN03, author = {Jari Arkko and Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Limitations of IPsec Policy Mechanisms}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {241--251}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_29}, doi = {10.1007/11542322\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArkkoN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Asokan03, author = {N. Asokan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {42--48}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_7}, doi = {10.1007/11542322\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Asokan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AsokanNN03, author = {N. Asokan and Valtteri Niemi and Kaisa Nyberg}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Man-in-the-Middle in Tunnelled Authentication Protocols}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {28--41}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_6}, doi = {10.1007/11542322\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AsokanNN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella03, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Protocol's Life After Attacks... (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {11--18}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_3}, doi = {10.1007/11542322\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaBM03, author = {Giampaolo Bella and Stefano Bistarelli and Fabio Massacci}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Protocol's Life After Attacks...}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {3--10}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_2}, doi = {10.1007/11542322\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaBM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaBM03a, author = {Giampaolo Bella and Stefano Bistarelli and Fabio Martinelli}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Biometrics to Enhance Smartcard Security}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {324--332}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_39}, doi = {10.1007/11542322\_39}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaBM03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaLP03, author = {Giampaolo Bella and Cristiano Longo and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Is the Verification Problem for Cryptographic Protocols Solved?}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {183--189}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_23}, doi = {10.1007/11542322\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze03, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{WAR:} Wireless Anonymous Routing (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {233--240}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_28}, doi = {10.1007/11542322\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeIKMR03, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis and Tal Malkin and Aviel D. Rubin}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{WAR:} Wireless Anonymous Routing}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {218--232}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_27}, doi = {10.1007/11542322\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeIKMR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BonattiVS03, author = {Piero A. Bonatti and Sabrina De Capitani di Vimercati and Pierangela Samarati}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards Flexible Credential Negotiation Protocols}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {19--23}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_4}, doi = {10.1007/11542322\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BonattiVS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BoydMP03, author = {Colin Boyd and Wenbo Mao and Kenneth G. Paterson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Deniable Authenticated Key Establishment for Internet Protocols}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {255--271}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_31}, doi = {10.1007/11542322\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BoydMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterY03, author = {Mike Burmester and Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {274--282}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_33}, doi = {10.1007/11542322\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson03, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Where Have All the Protocols Gone?}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {1--2}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_1}, doi = {10.1007/11542322\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson03a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Sessions from Weak Secrets (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {206--212}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_25}, doi = {10.1007/11542322\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonRW03, author = {Bruce Christianson and Michael Roe and David Wheeler}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Sessions from Weak Secrets}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {190--205}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_24}, doi = {10.1007/11542322\_24}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dam03, author = {Mads Dam}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Regular {SPKI}}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {134--150}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_18}, doi = {10.1007/11542322\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dam03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dam03a, author = {Mads Dam}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Regular {SPKI} (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {151--152}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_19}, doi = {10.1007/11542322\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dam03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley03, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Framework for Autonomic Security Protocols (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {55--62}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_9}, doi = {10.1007/11542322\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FoleyZ03, author = {Simon N. Foley and Hongbin Zhou}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Framework for Autonomic Security Protocols}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {49--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_8}, doi = {10.1007/11542322\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/FoleyZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor03, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Guaranteeing Access in Spite of Distributed Service-Flooding Attacks}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {80--96}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_12}, doi = {10.1007/11542322\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor03a, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {97--105}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_13}, doi = {10.1007/11542322\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KuleszaK03, author = {Kamil Kulesza and Zbigniew Kotulski}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Addressing New Challenges by Building Security Protocols Around Graphs}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {301--306}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_36}, doi = {10.1007/11542322\_36}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KuleszaK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Malcolm03, author = {James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Blind Publication: {A} Copyright Library without Publication or Trust}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {336--340}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_41}, doi = {10.1007/11542322\_41}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Malcolm03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Malcolm03a, author = {James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Blind Publication: {A} Copyright Library Without Publication or Trust (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {341--349}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_42}, doi = {10.1007/11542322\_42}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Malcolm03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao03, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Deniable Authenticated Key Establishment for Internet Protocols (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {272--273}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_32}, doi = {10.1007/11542322\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Martinelli03, author = {Fabio Martinelli}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Biometrics to Enhance Smartcard Security (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {333--335}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_40}, doi = {10.1007/11542322\_40}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Martinelli03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Monahan03, author = {Brian Monahan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {From Security Protocols to Systems Security}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {307--322}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_37}, doi = {10.1007/11542322\_37}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Monahan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Monahan03a, author = {Brian Monahan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {From Security Protocols to Systems Security (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {323--323}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_38}, doi = {10.1007/11542322\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Monahan03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Pfitzmann03, author = {Birgit Pfitzmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Federated Identity-Management Protocols (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {175--177}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_21}, doi = {10.1007/11542322\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Pfitzmann03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PfitzmannW03, author = {Birgit Pfitzmann and Michael Waidner}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Federated Identity-Management Protocols}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {153--174}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_20}, doi = {10.1007/11542322\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PfitzmannW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Popescu03, author = {Bogdan C. Popescu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enforcing Security Policies for Distributed Objects Applications (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {131--133}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_17}, doi = {10.1007/11542322\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Popescu03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PopescuCTZ03, author = {Bogdan C. Popescu and Bruno Crispo and Andrew S. Tanenbaum and Maas Zeeman}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enforcing Security Policies for Distributed Objects Applications}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {119--130}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_16}, doi = {10.1007/11542322\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PopescuCTZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Price03, author = {Geraint Price}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Client v. Server Side Protocols, Interfaces and Storage}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {63--73}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_10}, doi = {10.1007/11542322\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Price03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Price03a, author = {Geraint Price}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Client v. Server Side Protocols, Interfaces and Storage (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {74--79}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_11}, doi = {10.1007/11542322\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Price03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe03, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Panel Session: Is Protocol Modelling Finished?}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {213--217}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_26}, doi = {10.1007/11542322\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan03, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Enforcing the Unenforceable}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {178--182}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_22}, doi = {10.1007/11542322\_22}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SaidiSD03, author = {Hassen Sa{\"{\i}}di and Victoria Stavridou and Bruno Dutertre}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocol Codesign}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {106--113}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_14}, doi = {10.1007/11542322\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SaidiSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Samarati03, author = {Pierangela Samarati}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards Flexible Credential Negotiation Protocols (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {24--27}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_5}, doi = {10.1007/11542322\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Samarati03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stavridou03, author = {Victoria Stavridou}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocol Codesign (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {114--118}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_15}, doi = {10.1007/11542322\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stavridou03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yasinsac03, author = {Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion)}, booktitle = {Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3364}, pages = {283--287}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/11542322\_34}, doi = {10.1007/11542322\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yasinsac03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArkkoN02, author = {Jari Arkko and Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {5--19}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_3}, doi = {10.1007/978-3-540-39871-4\_3}, timestamp = {Sat, 05 Sep 2020 18:04:37 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArkkoN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Aura02, author = {Tuomas Aura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Mobile IPv6 Security}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {215--234}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_18}, doi = {10.1007/978-3-540-39871-4\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Aura02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaB02, author = {Giampaolo Bella and Stefano Bistarelli}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {104--119}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_10}, doi = {10.1007/978-3-540-39871-4\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaP02, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Analyzing Delegation Properties}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {120--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_11}, doi = {10.1007/978-3-540-39871-4\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson02, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Introduction (Transcript)}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {1}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_1}, doi = {10.1007/978-3-540-39871-4\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson02a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Concluding Discussion: Accounting for Resources}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {235--241}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_19}, doi = {10.1007/978-3-540-39871-4\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonS02, author = {Bruce Christianson and Jean Fiona Snook}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Shrink-Wrapped Optimism: The {DODA} Approach to Distributed Document Processing}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {74--95}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_8}, doi = {10.1007/978-3-540-39871-4\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/EschenauerGB02, author = {Laurent Eschenauer and Virgil D. Gligor and John S. Baras}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On Trust Establishment in Mobile Ad-Hoc Networks}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {47--66}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_6}, doi = {10.1007/978-3-540-39871-4\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/EschenauerGB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FirozabadiS02, author = {Babak Sadighi Firozabadi and Marek J. Sergot}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Contractual Access Control}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {96--103}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_9}, doi = {10.1007/978-3-540-39871-4\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FirozabadiS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley02, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Supporting Imprecise Delegation in KeyNote}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {179--188}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_15}, doi = {10.1007/978-3-540-39871-4\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Foley02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao02, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Structured Operational Modelling of the Dolev-Yao Threat Model}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {34--46}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_5}, doi = {10.1007/978-3-540-39871-4\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MitchellP02, author = {Chris J. Mitchell and Paulo S. Pagliusi}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Is Entity Authentication Necessary?}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {20--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_4}, doi = {10.1007/978-3-540-39871-4\_4}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MitchellP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham02, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {2--4}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_2}, doi = {10.1007/978-3-540-39871-4\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham02a, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Back to the Beginning}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {242}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_20}, doi = {10.1007/978-3-540-39871-4\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NikanderA02, author = {Pekka Nikander and Jari Arkko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Delegation of Signalling Rights}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {203--214}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_17}, doi = {10.1007/978-3-540-39871-4\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NikanderA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SasakiYI02, author = {Ry{\^{o}}ichi Sasaki and Hiroshi Yoshiura and Shinji Itoh}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Combinatorial Optimization of Countermeasures against Illegal Copying}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {128--144}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_12}, doi = {10.1007/978-3-540-39871-4\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SasakiYI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ValdesACDDLSSU02, author = {Alfonso Valdes and Magnus Almgren and Steven Cheung and Yves Deswarte and Bruno Dutertre and Joshua Levy and Hassen Sa{\"{\i}}di and Victoria Stavridou and Tom{\'{a}}s E. Uribe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {An Architecture for an Adaptive Intrusion-Tolerant Server}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {158--178}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_14}, doi = {10.1007/978-3-540-39871-4\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ValdesACDDLSSU02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yahalom02, author = {Raphael Yahalom}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocols with Certified-Transfer Servers}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {145--157}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_13}, doi = {10.1007/978-3-540-39871-4\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yahalom02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YasinsacD02, author = {Alec Yasinsac and James A. Davis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract)}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {189--202}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_16}, doi = {10.1007/978-3-540-39871-4\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YasinsacD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraMITS02, author = {Hiroshi Yoshiura and Kunihiko Miyazaki and Shinji Itoh and Kazuo Takaragi and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Legally Authorized and Unauthorized Digital Evidence}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {67--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_7}, doi = {10.1007/978-3-540-39871-4\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraMITS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2001, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45807-7}, doi = {10.1007/3-540-45807-7}, isbn = {3-540-44263-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AielloBBCIKR01, author = {William Aiello and Steven M. Bellovin and Matt Blaze and Ran Canetti and John Ioannidis and Angelos D. Keromytis and Omer Reingold}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {27--39}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_5}, doi = {10.1007/3-540-45807-7\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/AielloBBCIKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AuraM01, author = {Tuomas Aura and Silja M{\"{a}}ki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Survivable Security Architecture for Ad-Hoc Networks}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {63--73}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_9}, doi = {10.1007/3-540-45807-7\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AuraM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaP01, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Proof of Non-repudiation}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {119--125}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_19}, doi = {10.1007/3-540-45807-7\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze01, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {40--48}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_6}, doi = {10.1007/3-540-45807-7\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson01, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Merkle Puzzles Revisited (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {91--94}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_14}, doi = {10.1007/3-540-45807-7\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson01a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Concluding Discussion: When Does Confidentiality Harm Security?}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {229--238}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_33}, doi = {10.1007/3-540-45807-7\_33}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonW01, author = {Bruce Christianson and David Wheeler}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Merkle Puzzles Revisited - Finding Matching Elements Between Lists}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {87--90}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_13}, doi = {10.1007/3-540-45807-7\_13}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Drabwell01, author = {Peter Drabwell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Bluetooth Security - Fact or Fiction? (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {221--228}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_32}, doi = {10.1007/3-540-45807-7\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Drabwell01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Firozabadi01, author = {Babak Sadighi Firozabadi}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {146--150}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_22}, doi = {10.1007/3-540-45807-7\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Firozabadi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FirozabadiSB01, author = {Babak Sadighi Firozabadi and Marek J. Sergot and Olav L. Bandmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Authority Certificates to Create Management Structures}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {134--145}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_21}, doi = {10.1007/3-540-45807-7\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FirozabadiSB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley01, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Trust Management and Whether to Delegate}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {151--157}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_23}, doi = {10.1007/3-540-45807-7\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley01a, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Trust Management and Whether to Delegate (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {158--165}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_24}, doi = {10.1007/3-540-45807-7\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor01, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Negotiation of Access Control Policies (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {202--212}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_29}, doi = {10.1007/3-540-45807-7\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorKKBB01, author = {Virgil D. Gligor and Himanshu Khurana and Radostina K. Koleva and Vijay G. Bharadwaj and John S. Baras}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On the Negotiation of Access Control Policies}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {188--201}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_28}, doi = {10.1007/3-540-45807-7\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorKKBB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann01, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{PIM} Security}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {80--81}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_11}, doi = {10.1007/3-540-45807-7\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann01a, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {{PIM} Security (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {82--86}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_12}, doi = {10.1007/3-540-45807-7\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jurjens01, author = {Jan J{\"{u}}rjens}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Encapsulating Rules of Prudent Security Engineering}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {95--101}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_15}, doi = {10.1007/3-540-45807-7\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jurjens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Jurjens01a, author = {Jan J{\"{u}}rjens}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {102--106}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_16}, doi = {10.1007/3-540-45807-7\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Jurjens01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas01, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {You Can't Take It with You}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {166--169}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_25}, doi = {10.1007/3-540-45807-7\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Maki01, author = {Silja M{\"{a}}ki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {74--79}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_10}, doi = {10.1007/3-540-45807-7\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Maki01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham01, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address: Mobile Computing versus Immobile Security}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {1--3}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_1}, doi = {10.1007/3-540-45807-7\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nikander01, author = {Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {12--21}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_3}, doi = {10.1007/3-540-45807-7\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nikander01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nikander01a, author = {Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {22--26}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_4}, doi = {10.1007/3-540-45807-7\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nikander01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson01, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Proof of Non-repudiation (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {126--133}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_20}, doi = {10.1007/3-540-45807-7\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Price01, author = {Geraint Price}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Thwarting Timing Attacks Using {ATM} Networks}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {49--58}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_7}, doi = {10.1007/3-540-45807-7\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Price01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Price01a, author = {Geraint Price}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Thwarting Timing Attacks Using {ATM} Networks (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {59--62}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_8}, doi = {10.1007/3-540-45807-7\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Price01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe01, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Experiences of Mobile {IP} Security}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {4--11}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_2}, doi = {10.1007/3-540-45807-7\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Saidi01, author = {Hassen Sa{\"{\i}}di}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Intrusion-Tolerant Group Management in Enclaves}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {213--216}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_30}, doi = {10.1007/3-540-45807-7\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Saidi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Thucydides01, author = {Thucydides}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Last Word}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {239}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_34}, doi = {10.1007/3-540-45807-7\_34}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Thucydides01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wheeler01, author = {David Wheeler}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocols Using Keys from Faulty Data}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {170--179}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_26}, doi = {10.1007/3-540-45807-7\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wheeler01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wheeler01a, author = {David Wheeler}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocols Using Keys from Faulty Data (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {180--187}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_27}, doi = {10.1007/3-540-45807-7\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wheeler01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yoshiura01, author = {Hiroshi Yoshiura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {115--118}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_18}, doi = {10.1007/3-540-45807-7\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yoshiura01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraMITS01, author = {Hiroshi Yoshiura and Kunihiko Miyazaki and Shinji Itoh and Kazuo Takaragi and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Multi-OS Approach to Trusted Computer Systems}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {107--114}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_17}, doi = {10.1007/3-540-45807-7\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraMITS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/alcolm01, author = {James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Lightweight Authentication in a Mobile Network (Transcript of Discussion)}, booktitle = {Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2467}, pages = {217--220}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45807-7\_31}, doi = {10.1007/3-540-45807-7\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/alcolm01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2000, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44810-1}, doi = {10.1007/3-540-44810-1}, isbn = {3-540-42566-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson00, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {The Correctness of Crypto Transaction Sets}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {125--127}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_17}, doi = {10.1007/3-540-44810-1\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson00a, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {The Correctness of Crypto Transaction Sets (Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {128--141}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_18}, doi = {10.1007/3-540-44810-1\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Aura00, author = {Tuomas Aura}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {178--181}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_23}, doi = {10.1007/3-540-44810-1\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Aura00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AuraNL00, author = {Tuomas Aura and Pekka Nikander and Jussipekka Leiwo}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {DOS-Resistant Authentication with Client Puzzles}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {170--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_22}, doi = {10.1007/3-540-44810-1\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AuraNL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella00, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Lack of Explicitness Strikes Back}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {87--93}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_13}, doi = {10.1007/3-540-44810-1\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella00a, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Lack of Explicitness Strikes Back (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {94--99}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_14}, doi = {10.1007/3-540-44810-1\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaMPT00, author = {Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson and Piero Tramontano}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Making Sense of Specifications: The Formalization of {SET}}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {74--81}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_11}, doi = {10.1007/3-540-44810-1\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaMPT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze00, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {54--61}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_9}, doi = {10.1007/3-540-44810-1\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson00, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {184--193}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_25}, doi = {10.1007/3-540-44810-1\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonCM00, author = {Bruce Christianson and Bruno Crispo and James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {182--183}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_24}, doi = {10.1007/3-540-44810-1\_24}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonCM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Danezis00, author = {George Danezis}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {223--233}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_29}, doi = {10.1007/3-540-44810-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Danezis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor00, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Review and Revocation of Access Privileges Distributed with {PKI} Certificates (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {113--124}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_16}, doi = {10.1007/3-540-44810-1\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorBI00, author = {Virgil D. Gligor and Matt Blaze and John Ioannidis}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Denial of Service - Panel Discussion}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {194--203}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_26}, doi = {10.1007/3-540-44810-1\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorBI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollman00, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Mergers and Principals (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {14--19}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_3}, doi = {10.1007/3-540-44810-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollman00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann00, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Mergers and Principals}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {5--13}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_2}, doi = {10.1007/3-540-44810-1\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ioannidis00, author = {John Ioannidis}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {142--154}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_19}, doi = {10.1007/3-540-44810-1\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ioannidis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KhuranaG00, author = {Himanshu Khurana and Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Review and Revocation of Access Privileges Distributed with {PKI} Certificates}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {100--112}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_15}, doi = {10.1007/3-540-44810-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KhuranaG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Landrock00, author = {Peter Landrock}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Interactive Identification Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {43--48}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_7}, doi = {10.1007/3-540-44810-1\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Landrock00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas00, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {I Cannot Tell a Lie (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {253--255}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_33}, doi = {10.1007/3-540-44810-1\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao00, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Short Certification of Secure {RSA} Modulus (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {234--237}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_30}, doi = {10.1007/3-540-44810-1\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham00, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {1--4}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_1}, doi = {10.1007/3-540-44810-1\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nikander00, author = {Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Users and Trust in Cyberspace (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {36--42}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_6}, doi = {10.1007/3-540-44810-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nikander00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NikanderK00, author = {Pekka Nikander and Kristiina Karvonen}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Users and Trust in Cyberspace}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {24--35}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_5}, doi = {10.1007/3-540-44810-1\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NikanderK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson00, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Making Sense of Specifications: The Formalization of {SET} (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {82--86}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_12}, doi = {10.1007/3-540-44810-1\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Price00, author = {Geraint Price}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Broadening the Scope of Fault Tolerance within Secure Services}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {155--164}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_20}, doi = {10.1007/3-540-44810-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Price00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Price00a, author = {Geraint Price}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {165--169}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_21}, doi = {10.1007/3-540-44810-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Price00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe00, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Authentication and Naming (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {20--23}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_4}, doi = {10.1007/3-540-44810-1\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RoeAHL00, author = {Michael Roe and Ross J. Anderson and William S. Harbison and T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Government Access to Keys - Panel Discussion}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {62--73}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_10}, doi = {10.1007/3-540-44810-1\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RoeAHL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan00, author = {Peter Ryan}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Open Questions (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {49--53}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_8}, doi = {10.1007/3-540-44810-1\_8}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano00, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {The Resurrecting Duckling - What Next?}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {204--214}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_27}, doi = {10.1007/3-540-44810-1\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano00a, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {The Resurrecting Duckling - What Next? (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {215--222}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_28}, doi = {10.1007/3-540-44810-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/X00, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Afterward}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {256}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_34}, doi = {10.1007/3-540-44810-1\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/X00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yoshiura00, author = {Hiroshi Yoshiura}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - {A} Practical Analysis (Transcript of Discussion)}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {249--252}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_32}, doi = {10.1007/3-540-44810-1\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yoshiura00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraSSSTKTS00, author = {Hiroshi Yoshiura and Takaaki Shigematsu and Seiichi Susaki and Tsukasa Saitoh and Hisashi Toyoshima and Chikako Kurita and Satoru Tezuka and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and Michael Roe}, title = {Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - {A} Practical Analysis}, booktitle = {Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2133}, pages = {238--248}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44810-1\_31}, doi = {10.1007/3-540-44810-1\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraSSSTKTS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/1999, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10720107}, doi = {10.1007/10720107}, isbn = {3-540-67381-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ahlberg99, author = {Allan Ahlberg}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Who Knows?}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {228}, publisher = {Springer}, year = {1999}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ahlberg99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonL99, author = {Ross J. Anderson and Jong{-}Hyeon Lee}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Jikzi: {A} New Framework for Secure Publishing}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {21--47}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_4}, doi = {10.1007/10720107\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bella99, author = {Giampaolo Bella}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modelling Agents' Knowledge Inductively}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {85--94}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_12}, doi = {10.1007/10720107\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bella99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BergadanoCC99, author = {Francesco Bergadano and Davide Cavagnino and Bruno Crispo}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Issues in Multicast Security}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {119--139}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_18}, doi = {10.1007/10720107\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BergadanoCC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeIK99, author = {Matt Blaze and John Ioannidis and Angelos D. Keromytis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Trust Management and Network Layer Security Protocols}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {103--118}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_16}, doi = {10.1007/10720107\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeIK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson99, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Auditing against Impossible Abstractions}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {60--64}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_8}, doi = {10.1007/10720107\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonMR99, author = {Bruce Christianson and James A. Malcolm and Brian L. Robinson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Pictures Can't Lie under Oath}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {208--218}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_28}, doi = {10.1007/10720107\_28}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonMR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FirozabadiS99, author = {Babak Sadighi Firozabadi and Marek J. Sergot}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Power and Permission in Security Systems}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {48--59}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_6}, doi = {10.1007/10720107\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FirozabadiS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorD99, author = {Virgil D. Gligor and Pompiliu Donescu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Integrity-Aware {PCBC} Encryption Schemes}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {153--171}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_22}, doi = {10.1007/10720107\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann99, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {What Is Authentication?}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {65--72}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_9}, doi = {10.1007/10720107\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lee99, author = {E. Stewart Lee}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Composing Security Properties}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {6--14}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_2}, doi = {10.1007/10720107\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lee99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas99, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Auditing against Multiple Policies}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {15--20}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_3}, doi = {10.1007/10720107\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao99, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Time-Lock Puzzle with Examinable Evidence of Unlocking Time}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {95--102}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_14}, doi = {10.1007/10720107\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Morris99, author = {Robert H. Morris Sr.}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Bob versus Bob - Good Guy/Bad Guy}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {219--227}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_30}, doi = {10.1007/10720107\_30}, timestamp = {Tue, 24 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Morris99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham99, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address: The Changing Environment}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {1--5}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_1}, doi = {10.1007/10720107\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson99, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Relatios Between Secrets: The Yahalom Protocol}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {73--84}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_10}, doi = {10.1007/10720107\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe99, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Performance of Protocols}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {140--152}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_20}, doi = {10.1007/10720107\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StajanoA99, author = {Frank Stajano and Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {172--194}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_24}, doi = {10.1007/10720107\_24}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StajanoA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraSNSTST99, author = {Hiroshi Yoshiura and Seiichi Susaki and Yasuhiko Nagai and Tsukasa Saitoh and Hisashi Toyoshima and Ry{\^{o}}ichi Sasaki and Satoru Tezuka}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds}, booktitle = {Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1796}, pages = {195--207}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720107\_26}, doi = {10.1007/10720107\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraSNSTST99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/1998, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49135-X}, doi = {10.1007/3-540-49135-X}, isbn = {3-540-65663-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anonymous98, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Discussion Session - Trust Management}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {64--63}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_10}, doi = {10.1007/3-540-49135-X\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anonymous98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bergadano98, author = {Francesco Bergadano}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Third Party Certification of {HTTP} Service Access Statistics (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {100--107}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_16}, doi = {10.1007/3-540-49135-X\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bergadano98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BergadanoM98, author = {Francesco Bergadano and P. De Mauro}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Third Party Certification of {HTTP} Service Access Statistics (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {95--99}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_15}, doi = {10.1007/3-540-49135-X\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BergadanoM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeFK98, author = {Matt Blaze and Joan Feigenbaum and Angelos D. Keromytis}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {59--63}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_9}, doi = {10.1007/3-540-49135-X\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeFK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson98, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation and Not-So Smart Card (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {158--167}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_24}, doi = {10.1007/3-540-49135-X\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonM98, author = {Bruce Christianson and James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation and Not-So Smart Cards (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {154--157}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_23}, doi = {10.1007/3-540-49135-X\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Crispo98, author = {Bruno Crispo}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation of Responsibility (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {118--124}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_18}, doi = {10.1007/3-540-49135-X\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Crispo98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Crispo98a, author = {Bruno Crispo}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation of Responsibility (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {125--130}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_19}, doi = {10.1007/3-540-49135-X\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Crispo98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ellison98, author = {Carl M. Ellison}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {The Trust Shell Game (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {36--40}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_5}, doi = {10.1007/3-540-49135-X\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ellison98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ellison98a, author = {Carl M. Ellison}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {The Trust Shell Game (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {41--44}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_6}, doi = {10.1007/3-540-49135-X\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ellison98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum98, author = {Joan Feigenbaum}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Overview of the AT{\&}T Labs Trust-Management Project (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {45--50}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_7}, doi = {10.1007/3-540-49135-X\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum98a, author = {Joan Feigenbaum}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Overview of the AT{\&}T Labs Trust-Management Project (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {51--58}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_8}, doi = {10.1007/3-540-49135-X\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley98, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {External Consistency and the Verification of Security Protocols (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {24--27}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_3}, doi = {10.1007/3-540-49135-X\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley98a, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {External Consistency and the Verification of Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {28--35}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_4}, doi = {10.1007/3-540-49135-X\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor98, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Application-Oriented Security Policies and Their Composition (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {75--82}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_12}, doi = {10.1007/3-540-49135-X\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorG98, author = {Virgil D. Gligor and Serban I. Gavrila}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Application-Oriented Security Policies and Their Composition (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {67--74}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_11}, doi = {10.1007/3-540-49135-X\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorLLYW98, author = {Virgil D. Gligor and Peter Landrock and T. Mark A. Lomas and Raphael Yahalom and John P. Warne}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Discussion Session: Differences Between Academic and Commercial Security}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {177--192}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_26}, doi = {10.1007/3-540-49135-X\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorLLYW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann98, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Insider Fraud (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {213--219}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_29}, doi = {10.1007/3-540-49135-X\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann98a, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Insider Fraud (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {220--226}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_30}, doi = {10.1007/3-540-49135-X\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Harbison98, author = {William S. Harbison}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegating Trust (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {108--117}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_17}, doi = {10.1007/3-540-49135-X\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Harbison98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Landrock98, author = {Peter Landrock}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {A New Concept in Protocols: Verifiable Computational Delegation (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {137--145}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_21}, doi = {10.1007/3-540-49135-X\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Landrock98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Landrock98a, author = {Peter Landrock}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {146--153}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_22}, doi = {10.1007/3-540-49135-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Landrock98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas98, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Abuse of Process (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {131--136}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_20}, doi = {10.1007/3-540-49135-X\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NeedhamLFGC98, author = {Roger M. Needham and E. Stewart Lee and Joan Feigenbaum and Virgil D. Gligor and Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Panel Session - Future Directions}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {227--239}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_31}, doi = {10.1007/3-540-49135-X\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NeedhamLFGC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson98, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Inductive Analysis of the Internet Protocol {TLS} (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {1--12}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_1}, doi = {10.1007/3-540-49135-X\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson98a, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Inductive Analysis of the Internet Protocol {TLS} (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {13--23}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_2}, doi = {10.1007/3-540-49135-X\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe98, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Certification and Delegation (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {168--176}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_25}, doi = {10.1007/3-540-49135-X\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Sasaki98, author = {Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {90--94}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_14}, doi = {10.1007/3-540-49135-X\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Sasaki98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yahalom98, author = {Raphael Yahalom}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Optimistic Trust with Realistic \emph{e}Nvestigators (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {193--202}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_27}, doi = {10.1007/3-540-49135-X\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yahalom98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yahalom98a, author = {Raphael Yahalom}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Optimistic Trust with Realistic \emph{e}Nvestigators (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {203--212}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_28}, doi = {10.1007/3-540-49135-X\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yahalom98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraST98, author = {Hiroshi Yoshiura and Ry{\^{o}}ichi Sasaki and Kazuo Takaragi}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Secure Fingerprinting Using Public-Key Cryptography (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {83--89}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_13}, doi = {10.1007/3-540-49135-X\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/1997, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0028154}, doi = {10.1007/BFB0028154}, isbn = {3-540-64040-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonK97, author = {Ross J. Anderson and Markus G. Kuhn}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Low Cost Attacks on Tamper Resistant Devices}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {125--136}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028165}, doi = {10.1007/BFB0028165}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonMPBH97, author = {Ross J. Anderson and V{\'{a}}clav Maty{\'{a}}s Jr. and Fabien A. P. Petitcolas and Iain E. Buchan and Rudolf Hanka}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Secure Books: Protecting the Distribution of Knowledge}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {1--11}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028155}, doi = {10.1007/BFB0028155}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonMPBH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BaoDHJNN97, author = {Feng Bao and Robert H. Deng and Yongfei Han and Albert B. Jeng and Arcot Desai Narasimhalu and Teow{-}Hin Ngair}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {115--124}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028164}, doi = {10.1007/BFB0028164}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BaoDHJNN97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blake-WilsonM97, author = {Simon Blake{-}Wilson and Alfred Menezes}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {137--158}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028166}, doi = {10.1007/BFB0028166}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blake-WilsonM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonM97, author = {Bruce Christianson and James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Binding Bit Patterns to Real World Entities}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {105--113}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028163}, doi = {10.1007/BFB0028163}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Crispo97, author = {Bruno Crispo}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {53--65}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028159}, doi = {10.1007/BFB0028159}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Crispo97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gurgens97, author = {Sigrid G{\"{u}}rgens}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {{SG} Logic- {A} Formal Analysis Technique for Authentication Protocols}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {159--176}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028167}, doi = {10.1007/BFB0028167}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gurgens97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KelseySW97, author = {John Kelsey and Bruce Schneier and David A. Wagner}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Protocol Interactions and the Chosen Protocol Attack}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {91--104}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028162}, doi = {10.1007/BFB0028162}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/KelseySW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kiefer97, author = {Klaus Kiefer}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {A Weakness of the Menezes-Vanstone Cryptosystem}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {201--206}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028170}, doi = {10.1007/BFB0028170}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kiefer97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lucks97, author = {Stefan Lucks}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {79--90}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028161}, doi = {10.1007/BFB0028161}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lucks97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Okamoto97, author = {Tatsuaki Okamoto}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Receipt-Free Electronic Voting Schemes for Large Scale Elections}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {25--35}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028157}, doi = {10.1007/BFB0028157}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Okamoto97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Okamoto97a, author = {Tatsuaki Okamoto}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Threshold Key-Recovery Systems for {RSA}}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {191--200}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028169}, doi = {10.1007/BFB0028169}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Okamoto97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paillier97, author = {Pascal Paillier}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {On Ideal Non-perfect Secret Sharing Schemes}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {207--216}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028171}, doi = {10.1007/BFB0028171}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paillier97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Petersen97, author = {Holger Petersen}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {How to Convert any Digital Signature Scheme into a Group Signature Scheme}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {177--190}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028168}, doi = {10.1007/BFB0028168}, timestamp = {Fri, 15 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Petersen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PetersenM97, author = {Holger Petersen and Markus Michels}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {On Signature Schemes with Threshold Verification Detecting Malicious Verifiers}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {67--78}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028160}, doi = {10.1007/BFB0028160}, timestamp = {Fri, 15 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/PetersenM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ReedSG97, author = {Michael G. Reed and Paul F. Syverson and David M. Goldschlag}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Protocols Using Anonymous Connections: Mobile Applications}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {13--23}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028156}, doi = {10.1007/BFB0028156}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ReedSG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SolanaH97, author = {Eduardo Solana and J{\"{u}}rgen Harms}, editor = {Bruce Christianson and Bruno Crispo and T. Mark A. Lomas and Michael Roe}, title = {Flexible Internet Secure Transactions Based on Collaborative Domains}, booktitle = {Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1361}, pages = {37--51}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028158}, doi = {10.1007/BFB0028158}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SolanaH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/1996, editor = {T. Mark A. Lomas}, title = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-62494-5}, doi = {10.1007/3-540-62494-5}, isbn = {3-540-62494-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/1996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonMS96, author = {Ross J. Anderson and Charalampos Manifavas and Chris Sutherland}, editor = {T. Mark A. Lomas}, title = {NetCard - {A} Practical Electronic-Cash System}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {49--57}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_4}, doi = {10.1007/3-540-62494-5\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonMS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterD96, author = {Mike Burmester and Yvo Desmedt}, editor = {T. Mark A. Lomas}, title = {Efficient and Secure Conference-Key Distribution}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {119--129}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_12}, doi = {10.1007/3-540-62494-5\_12}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenGM96, author = {Liqun Chen and Dieter Gollmann and Chris J. Mitchell}, editor = {T. Mark A. Lomas}, title = {Key Escrow in Mutually Mistrusting Domains}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {139--153}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_14}, doi = {10.1007/3-540-62494-5\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChenGM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonH96, author = {Bruce Christianson and William S. Harbison}, editor = {T. Mark A. Lomas}, title = {Why Isn't Trust Transitive?}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {171--176}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_16}, doi = {10.1007/3-540-62494-5\_16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChuangG96, author = {Shaw{-}Cheng Chuang and David J. Greaves}, editor = {T. Mark A. Lomas}, title = {Securing the Residential Asynchronous Transfer Mode Networks}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {177--196}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_17}, doi = {10.1007/3-540-62494-5\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChuangG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CramerDP96, author = {Ronald Cramer and Ivan Damg{\aa}rd and Torben P. Pedersen}, editor = {T. Mark A. Lomas}, title = {Efficient and Provable Security Amplifications}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {101--109}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_9}, doi = {10.1007/3-540-62494-5\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CramerDP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CrispoL96, author = {Bruno Crispo and T. Mark A. Lomas}, editor = {T. Mark A. Lomas}, title = {A Certification Scheme for Electronic Commerce}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {19--32}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_2}, doi = {10.1007/3-540-62494-5\_2}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CrispoL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Cusick96, author = {Thomas W. Cusick}, editor = {T. Mark A. Lomas}, title = {A Comparison of {RSA} and the Naccache-Stern Public-Key Cryptosystem}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {111--116}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_10}, doi = {10.1007/3-540-62494-5\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Cusick96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FujisakiO96, author = {Eiichiro Fujisaki and Tatsuaki Okamoto}, editor = {T. Mark A. Lomas}, title = {Practical Escrow Cash System}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {33--48}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_3}, doi = {10.1007/3-540-62494-5\_3}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FujisakiO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JoyeQ96, author = {Marc Joye and Jean{-}Jacques Quisquater}, editor = {T. Mark A. Lomas}, title = {Protocol Failures for RSA-Like Functions Using Lucas Sequences and Elliptic Curves}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {93--100}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_8}, doi = {10.1007/3-540-62494-5\_8}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JoyeQ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Kaliski96, author = {Burton S. Kaliski Jr.}, editor = {T. Mark A. Lomas}, title = {{IEEE} {P1363:} {A} Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract)}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {117--118}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_11}, doi = {10.1007/3-540-62494-5\_11}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Kaliski96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LimL96, author = {Chae Hoon Lim and Pil Joong Lee}, editor = {T. Mark A. Lomas}, title = {Directed Signatures and Application to Threshold Cryptosystems}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {131--138}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_13}, doi = {10.1007/3-540-62494-5\_13}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LimL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao96, author = {Wenbo Mao}, editor = {T. Mark A. Lomas}, title = {On Cryptographic Techniques for On-line Bankcard Payment Transactions Using Open Networks}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {1--17}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_1}, doi = {10.1007/3-540-62494-5\_1}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NaorS96, author = {Moni Naor and Adi Shamir}, editor = {T. Mark A. Lomas}, title = {Visual Cryptography {II:} Improving the Contrast Via the Cover Base}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {197--202}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_18}, doi = {10.1007/3-540-62494-5\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NaorS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Pedersen96, author = {Torben P. Pedersen}, editor = {T. Mark A. Lomas}, title = {Electronic Payments of Small Amounts}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {59--68}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_5}, doi = {10.1007/3-540-62494-5\_5}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Pedersen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RivestS96, author = {Ronald L. Rivest and Adi Shamir}, editor = {T. Mark A. Lomas}, title = {PayWord and MicroMint: Two Simple Micropayment Schemes}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {69--87}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_6}, doi = {10.1007/3-540-62494-5\_6}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RivestS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SchneierK96, author = {Bruce Schneier and John Kelsey}, editor = {T. Mark A. Lomas}, title = {Automatic Event-Stream Notarization Using Digital Signatures}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {155--169}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_15}, doi = {10.1007/3-540-62494-5\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/SchneierK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wheeler96, author = {David Wheeler}, editor = {T. Mark A. Lomas}, title = {Transactions Using Bets}, booktitle = {Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1189}, pages = {89--92}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-62494-5\_7}, doi = {10.1007/3-540-62494-5\_7}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wheeler96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.