default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2011.bht:"
@inproceedings{DBLP:conf/spw/Anderson11, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Can We Fix the Security Economics of Federated Authentication?}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {25--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_4}, doi = {10.1007/978-3-642-25867-1\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson11a, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {33--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_5}, doi = {10.1007/978-3-642-25867-1\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson11b, author = {Jonathan Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Keep Bad Papers Out of Conferences (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {368--380}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_35}, doi = {10.1007/978-3-642-25867-1\_35}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Anderson11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonSW11, author = {Jonathan Anderson and Frank Stajano and Robert N. M. Watson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {359--367}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_34}, doi = {10.1007/978-3-642-25867-1\_34}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AndersonSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze11, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {One-Way Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {341--358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_33}, doi = {10.1007/978-3-642-25867-1\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau11, author = {Joseph Bonneau}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Getting Web Authentication Right {A} Best-Case Protocol for the Remaining Life of Passwords}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {98--104}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_8}, doi = {10.1007/978-3-642-25867-1\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bonneau11a, author = {Joseph Bonneau}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Getting Web Authentication Right (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {105--114}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_9}, doi = {10.1007/978-3-642-25867-1\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bonneau11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BonneauX11, author = {Joseph Bonneau and Rubin Xu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Scrambling for Lightweight Censorship Resistance}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {296--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_28}, doi = {10.1007/978-3-642-25867-1\_28}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BonneauX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Burmester11, author = {Mike Burmester}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {His Late Master's Voice: Barking for Location Privacy}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {4--14}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_2}, doi = {10.1007/978-3-642-25867-1\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Burmester11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Burmester11a, author = {Mike Burmester}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {His Late Master's Voice (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {15--24}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_3}, doi = {10.1007/978-3-642-25867-1\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Burmester11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Chen11, author = {Bangdao Chen}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {When Context Is Better Than Identity (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {126--131}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_11}, doi = {10.1007/978-3-642-25867-1\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChenNR11, author = {Bangdao Chen and Long Hoang Nguyen and Andrew William Roscoe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {When Context Is Better Than Identity: Authentication by Context Using Empirical Channels}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {115--125}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_10}, doi = {10.1007/978-3-642-25867-1\_10}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChenNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Choudary11, author = {Omar Choudary}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Make Noise and Whisper: {A} Solution to Relay Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {284--295}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_27}, doi = {10.1007/978-3-642-25867-1\_27}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Choudary11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChoudaryS11, author = {Omar Choudary and Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Make Noise and Whisper: {A} Solution to Relay Attacks}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {271--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_26}, doi = {10.1007/978-3-642-25867-1\_26}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChoudaryS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson11, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Introduction: Alice Doesn't Live Here Anymore (Transcript)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {1--3}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_1}, doi = {10.1007/978-3-642-25867-1\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ClarkGMWXB11, author = {Sandy Clark and Travis Goodspeed and Perry Metzger and Zachary Wasserman and Kevin Xu and Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {One-Way Cryptography}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {336--340}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_32}, doi = {10.1007/978-3-642-25867-1\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ClarkGMWXB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor11, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {243--257}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_23}, doi = {10.1007/978-3-642-25867-1\_23}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorW11, author = {Virgil D. Gligor and Jeannette M. Wing}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Towards a Theory of Trust in Networks of Humans and Computers}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {223--242}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_22}, doi = {10.1007/978-3-642-25867-1\_22}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao11, author = {Feng Hao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Sync with Alice (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {179--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_17}, doi = {10.1007/978-3-642-25867-1\_17}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoR11, author = {Feng Hao and Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {How to Sync with Alice}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {170--178}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_16}, doi = {10.1007/978-3-642-25867-1\_16}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KurMSS11, author = {Jir{\'{\i}} Kur and Vashek Matyas and Andriy Stetsko and Petr Svenda}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Attack Detection vs. Privacy - How to Find the Link or How to Hide It?}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {189--199}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_18}, doi = {10.1007/978-3-642-25867-1\_18}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KurMSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KurS11, author = {Jir{\'{\i}} Kur and Andriy Stetsko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {200--204}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_19}, doi = {10.1007/978-3-642-25867-1\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KurS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LenziniMP11, author = {Gabriele Lenzini and Sjouke Mauw and Jun Pang}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Selective Location Blinding Using Hash Chains}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {132--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_12}, doi = {10.1007/978-3-642-25867-1\_12}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LenziniMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Malcolm11, author = {James Malcolm}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {215--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_21}, doi = {10.1007/978-3-642-25867-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Malcolm11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mauw11, author = {Sjouke Mauw}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Selective Location Blinding Using Hash Chains (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {142--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_13}, doi = {10.1007/978-3-642-25867-1\_13}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mauw11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MurayamaFN11, author = {Yuko Murayama and Yasuhiro Fujihara and Dai Nishioka}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Sense of Security and a Countermeasure for the False Sense}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {205--214}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_20}, doi = {10.1007/978-3-642-25867-1\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MurayamaFN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe11, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Metaplace Security Model}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {313--326}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_30}, doi = {10.1007/978-3-642-25867-1\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe11a, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {The Metaplace Security Model (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {327--335}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_31}, doi = {10.1007/978-3-642-25867-1\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Shafarenko11, author = {Alex Shafarenko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {260--270}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_25}, doi = {10.1007/978-3-642-25867-1\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Shafarenko11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ShafarenkoC11, author = {Alexander V. Shafarenko and Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Gearing Up: How to Eat Your Cryptocake and Still Have It}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {258--259}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_24}, doi = {10.1007/978-3-642-25867-1\_24}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ShafarenkoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano11, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Pico: No More Passwords!}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {49--81}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_6}, doi = {10.1007/978-3-642-25867-1\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stajano11a, author = {Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Pico: No More Passwords! (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {82--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_7}, doi = {10.1007/978-3-642-25867-1\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stajano11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Xu11, author = {Rubin Xu}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {303--312}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_29}, doi = {10.1007/978-3-642-25867-1\_29}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Xu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Zugenmaier11, author = {Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {150--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_14}, doi = {10.1007/978-3-642-25867-1\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Zugenmaier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Zugenmaier11a, author = {Alf Zugenmaier}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)}, booktitle = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, pages = {156--169}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1\_15}, doi = {10.1007/978-3-642-25867-1\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Zugenmaier11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2011, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Frank Stajano}, title = {Security Protocols {XIX} - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7114}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25867-1}, doi = {10.1007/978-3-642-25867-1}, isbn = {978-3-642-25866-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.