Search dblp for Publications

export results for "toc:db/conf/spw/spw2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/spw/Anderson11,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Can We Fix the Security Economics of Federated Authentication?},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {25--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_4},
  doi          = {10.1007/978-3-642-25867-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson11a,
  author       = {Ross J. Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Can We Fix the Security Economics of Federated Authentication? (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_5},
  doi          = {10.1007/978-3-642-25867-1\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anderson11b,
  author       = {Jonathan Anderson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Keep Bad Papers Out of Conferences (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {368--380},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_35},
  doi          = {10.1007/978-3-642-25867-1\_35},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Anderson11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AndersonSW11,
  author       = {Jonathan Anderson and
                  Frank Stajano and
                  Robert N. M. Watson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {359--367},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_34},
  doi          = {10.1007/978-3-642-25867-1\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AndersonSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Blaze11,
  author       = {Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {One-Way Cryptography (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {341--358},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_33},
  doi          = {10.1007/978-3-642-25867-1\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Blaze11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau11,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Getting Web Authentication Right {A} Best-Case Protocol for the Remaining
                  Life of Passwords},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {98--104},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_8},
  doi          = {10.1007/978-3-642-25867-1\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bonneau11a,
  author       = {Joseph Bonneau},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Getting Web Authentication Right (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {105--114},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_9},
  doi          = {10.1007/978-3-642-25867-1\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bonneau11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BonneauX11,
  author       = {Joseph Bonneau and
                  Rubin Xu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Scrambling for Lightweight Censorship Resistance},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {296--302},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_28},
  doi          = {10.1007/978-3-642-25867-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BonneauX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Burmester11,
  author       = {Mike Burmester},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {His Late Master's Voice: Barking for Location Privacy},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {4--14},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_2},
  doi          = {10.1007/978-3-642-25867-1\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Burmester11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Burmester11a,
  author       = {Mike Burmester},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {His Late Master's Voice (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {15--24},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_3},
  doi          = {10.1007/978-3-642-25867-1\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Burmester11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Chen11,
  author       = {Bangdao Chen},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {When Context Is Better Than Identity (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {126--131},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_11},
  doi          = {10.1007/978-3-642-25867-1\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChenNR11,
  author       = {Bangdao Chen and
                  Long Hoang Nguyen and
                  Andrew William Roscoe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {When Context Is Better Than Identity: Authentication by Context Using
                  Empirical Channels},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {115--125},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_10},
  doi          = {10.1007/978-3-642-25867-1\_10},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChenNR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Choudary11,
  author       = {Omar Choudary},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Make Noise and Whisper: {A} Solution to Relay Attacks (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_27},
  doi          = {10.1007/978-3-642-25867-1\_27},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Choudary11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChoudaryS11,
  author       = {Omar Choudary and
                  Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Make Noise and Whisper: {A} Solution to Relay Attacks},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {271--283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_26},
  doi          = {10.1007/978-3-642-25867-1\_26},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChoudaryS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson11,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Introduction: Alice Doesn't Live Here Anymore (Transcript)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_1},
  doi          = {10.1007/978-3-642-25867-1\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ClarkGMWXB11,
  author       = {Sandy Clark and
                  Travis Goodspeed and
                  Perry Metzger and
                  Zachary Wasserman and
                  Kevin Xu and
                  Matt Blaze},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {One-Way Cryptography},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {336--340},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_32},
  doi          = {10.1007/978-3-642-25867-1\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ClarkGMWXB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor11,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Towards a Theory of Trust in Networks of Humans and Computers (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_23},
  doi          = {10.1007/978-3-642-25867-1\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorW11,
  author       = {Virgil D. Gligor and
                  Jeannette M. Wing},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Towards a Theory of Trust in Networks of Humans and Computers},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_22},
  doi          = {10.1007/978-3-642-25867-1\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao11,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Sync with Alice (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_17},
  doi          = {10.1007/978-3-642-25867-1\_17},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoR11,
  author       = {Feng Hao and
                  Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {How to Sync with Alice},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_16},
  doi          = {10.1007/978-3-642-25867-1\_16},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KurMSS11,
  author       = {Jir{\'{\i}} Kur and
                  Vashek Matyas and
                  Andriy Stetsko and
                  Petr Svenda},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Attack Detection vs. Privacy - How to Find the Link or How to Hide
                  It?},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {189--199},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_18},
  doi          = {10.1007/978-3-642-25867-1\_18},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KurMSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KurS11,
  author       = {Jir{\'{\i}} Kur and
                  Andriy Stetsko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Attack Detection vs Privacy - How to Find the Link or How to Hide
                  It (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {200--204},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_19},
  doi          = {10.1007/978-3-642-25867-1\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KurS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LenziniMP11,
  author       = {Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Selective Location Blinding Using Hash Chains},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {132--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_12},
  doi          = {10.1007/978-3-642-25867-1\_12},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LenziniMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Malcolm11,
  author       = {James Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Sense of Security and a Countermeasure for the False Sense (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {215--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_21},
  doi          = {10.1007/978-3-642-25867-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Malcolm11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mauw11,
  author       = {Sjouke Mauw},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Selective Location Blinding Using Hash Chains (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {142--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_13},
  doi          = {10.1007/978-3-642-25867-1\_13},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mauw11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MurayamaFN11,
  author       = {Yuko Murayama and
                  Yasuhiro Fujihara and
                  Dai Nishioka},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Sense of Security and a Countermeasure for the False Sense},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {205--214},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_20},
  doi          = {10.1007/978-3-642-25867-1\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MurayamaFN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe11,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Metaplace Security Model},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_30},
  doi          = {10.1007/978-3-642-25867-1\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe11a,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {The Metaplace Security Model (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {327--335},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_31},
  doi          = {10.1007/978-3-642-25867-1\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Shafarenko11,
  author       = {Alex Shafarenko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {260--270},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_25},
  doi          = {10.1007/978-3-642-25867-1\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Shafarenko11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ShafarenkoC11,
  author       = {Alexander V. Shafarenko and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Gearing Up: How to Eat Your Cryptocake and Still Have It},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {258--259},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_24},
  doi          = {10.1007/978-3-642-25867-1\_24},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ShafarenkoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano11,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Pico: No More Passwords!},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {49--81},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_6},
  doi          = {10.1007/978-3-642-25867-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano11a,
  author       = {Frank Stajano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Pico: No More Passwords! (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_7},
  doi          = {10.1007/978-3-642-25867-1\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Xu11,
  author       = {Rubin Xu},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {303--312},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_29},
  doi          = {10.1007/978-3-642-25867-1\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Xu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Zugenmaier11,
  author       = {Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Risks of Blind Controllers and Deaf Views in Model View Controller
                  Patterns for Multitag User Interfaces},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {150--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_14},
  doi          = {10.1007/978-3-642-25867-1\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Zugenmaier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Zugenmaier11a,
  author       = {Alf Zugenmaier},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  pages        = {156--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1\_15},
  doi          = {10.1007/978-3-642-25867-1\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Zugenmaier11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2011,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Frank Stajano},
  title        = {Security Protocols {XIX} - 19th International Workshop, Cambridge,
                  UK, March 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7114},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25867-1},
  doi          = {10.1007/978-3-642-25867-1},
  isbn         = {978-3-642-25866-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}