Search dblp for Publications

export results for "toc:db/conf/spw/spw2016.bht:"

 download as .bib file

@proceedings{DBLP:conf/spw/2016,
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62033-6},
  doi          = {10.1007/978-3-319-62033-6},
  isbn         = {978-3-319-62032-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaqerA16,
  author       = {Khaled Baqer and
                  Ross J. Anderson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {SMAPs: Short Message Authentication Protocols (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {133--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_16},
  doi          = {10.1007/978-3-319-62033-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaqerA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BaqerBAK16,
  author       = {Khaled Baqer and
                  S. Johann Bezuidenhoudt and
                  Ross J. Anderson and
                  Markus G. Kuhn},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {SMAPs: Short Message Authentication Protocols},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_15},
  doi          = {10.1007/978-3-319-62033-6\_15},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BaqerBAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bella16,
  author       = {Giampaolo Bella},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Invisible Security (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {10--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_2},
  doi          = {10.1007/978-3-319-62033-6\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bella16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaC016,
  author       = {Giampaolo Bella and
                  Bruce Christianson and
                  Luca Vigan{\`{o}}},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Invisible Security},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_1},
  doi          = {10.1007/978-3-319-62033-6\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaC016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson16,
  author       = {Bruce Christianson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Price of Belief: Insuring Credible Trust? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {39--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_6},
  doi          = {10.1007/978-3-319-62033-6\_6},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor16,
  author       = {Virgil D. Gligor},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link
                  Flooding Incidents (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {58--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_8},
  doi          = {10.1007/978-3-319-62033-6\_8},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GoldbergJLS16,
  author       = {Ian Goldberg and
                  Graeme Jenkinson and
                  David Llewellyn{-}Jones and
                  Frank Stajano},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Red Button and Yellow Button: Usable Security for Lost Security Tokens},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {165--171},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_19},
  doi          = {10.1007/978-3-319-62033-6\_19},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GoldbergJLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Happe16,
  author       = {Andreas Happe},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Malicious Clients in Distributed Secret Sharing Based Storage Networks
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {215--218},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_24},
  doi          = {10.1007/978-3-319-62033-6\_24},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Happe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HappeKL16,
  author       = {Andreas Happe and
                  Stephan Krenn and
                  Thomas Lor{\"{u}}nser},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Malicious Clients in Distributed Secret Sharing Based Storage Networks},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {206--214},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_23},
  doi          = {10.1007/978-3-319-62033-6\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HappeKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Jonker16,
  author       = {Hugo Jonker},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {26--34},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_4},
  doi          = {10.1007/978-3-319-62033-6\_4},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Jonker16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JonkerMT16,
  author       = {Hugo L. Jonker and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {19--25},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_3},
  doi          = {10.1007/978-3-319-62033-6\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JonkerMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KangGS16,
  author       = {Min Suk Kang and
                  Virgil D. Gligor and
                  Vyas Sekar},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Defending Against Evolving DDoS Attacks: {A} Case Study Using Link
                  Flooding Incidents},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {47--57},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_7},
  doi          = {10.1007/978-3-319-62033-6\_7},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KangGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Kidney16,
  author       = {Brian J. Kidney},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Exploiting Autocorrect to Attack Privacy (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {110--118},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_14},
  doi          = {10.1007/978-3-319-62033-6\_14},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Kidney16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KidneyA16,
  author       = {Brian J. Kidney and
                  Jonathan Anderson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Exploiting Autocorrect to Attack Privacy},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {103--109},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_13},
  doi          = {10.1007/978-3-319-62033-6\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/KidneyA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16,
  author       = {David Llewellyn{-}Jones and
                  Graeme Jenkinson and
                  Frank Stajano},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Explicit Delegation Using Configurable Cookies},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {141--152},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_17},
  doi          = {10.1007/978-3-319-62033-6\_17},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Llewellyn-Jones16a,
  author       = {David Llewellyn{-}Jones},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Explicit Delegation Using Configurable Cookies (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {153--164},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_18},
  doi          = {10.1007/978-3-319-62033-6\_18},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Llewellyn-Jones16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/OstadalSM16,
  author       = {Radim Ost{\'{a}}dal and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Reconsidering Attacker Models in Ad-Hoc Networks},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {219--227},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_25},
  doi          = {10.1007/978-3-319-62033-6\_25},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/OstadalSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PieczulF16,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Evolution of a Security Control},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_9},
  doi          = {10.1007/978-3-319-62033-6\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/PieczulF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PieczulF16a,
  author       = {Olgierd Pieczul and
                  Simon N. Foley},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Evolution of a Security Control or Why Do We Need More Qualitative
                  Research of Software Vulnerabilties? (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {85--89},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_10},
  doi          = {10.1007/978-3-319-62033-6\_10},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PieczulF16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roscoe16,
  author       = {A. W. Roscoe},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Detecting Failed Attacks on Human-Interactive Security Protocols},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_21},
  doi          = {10.1007/978-3-319-62033-6\_21},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roscoe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roscoe16a,
  author       = {A. W. Roscoe},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {198--205},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_22},
  doi          = {10.1007/978-3-319-62033-6\_22},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roscoe16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stajano16,
  author       = {Frank Stajano},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Red Button and Yellow Button: Usable Security for Lost Security Tokens
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_20},
  doi          = {10.1007/978-3-319-62033-6\_20},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stajano16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Svenda16,
  author       = {Petr Svenda},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {228--231},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_26},
  doi          = {10.1007/978-3-319-62033-6\_26},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Svenda16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WernickC16,
  author       = {Paul Wernick and
                  Bruce Christianson},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {The Price of Belief: Insuring Credible Trust?},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {35--38},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_5},
  doi          = {10.1007/978-3-319-62033-6\_5},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WernickC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan16,
  author       = {Jeff Yan},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Novel Security and Privacy Perspectives of Camera Fingerprints},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {90--95},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_11},
  doi          = {10.1007/978-3-319-62033-6\_11},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan16a,
  author       = {Jeff Yan},
  editor       = {Jonathan Anderson and
                  Vashek Maty{\'{a}}s and
                  Bruce Christianson and
                  Frank Stajano},
  title        = {Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXIV} - 24th International Workshop, Brno, Czech
                  Republic, April 7-8, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10368},
  pages        = {96--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62033-6\_12},
  doi          = {10.1007/978-3-319-62033-6\_12},
  timestamp    = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}