- 2011
- Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Lecture Notes in Computer Science 6615, Springer 2011, ISBN 978-3-642-22136-1 [contents] - 2008
- Ross J. Anderson:
What Next After Anonymity? (Transcript of Discussion). Security Protocols Workshop 2008: 223-231 - Ross J. Anderson, Steven J. Murdoch:
What Next after Anonymity? Security Protocols Workshop 2008: 220-222 - S. Farshad Bahari, Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks. Security Protocols Workshop 2008: 118-119 - Matt Blaze:
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion). Security Protocols Workshop 2008: 244-255 - Matt Blaze, Sandy Clark:
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract. Security Protocols Workshop 2008: 241-243 - Haibo Chen, Jun Li, Wenbo Mao:
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing. Security Protocols Workshop 2008: 107-114 - Bruce Christianson:
Remodelling the Attacker (Transcript of Discussion). Security Protocols Workshop 2008: 1-2 - Bruce Christianson:
Security Protocol Deployment Risk (Transcript of Discussion). Security Protocols Workshop 2008: 21-24 - Daniel Cvrcek, George Danezis:
Fighting the 'Good' Internet War. Security Protocols Workshop 2008: 3-11 - George Danezis:
Covert Communications Despite Traffic Data Retention. Security Protocols Workshop 2008: 198-214 - George Danezis:
Covert Communications Despite Traffic Data Retention (Transcript of Discussion). Security Protocols Workshop 2008: 215-219 - Simon N. Foley, Giampaolo Bella, Stefano Bistarelli:
Security Protocol Deployment Risk. Security Protocols Workshop 2008: 12-20 - Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion). Security Protocols Workshop 2008: 120-125 - Dieter Gollmann:
Problems with Same Origin Policy - Know Thyself. Security Protocols Workshop 2008: 84-85 - Dieter Gollmann:
Problems with Same Origin Policy (Transcript of Discussion). Security Protocols Workshop 2008: 86-92 - Feng Hao:
Password Authenticated Key Exchange by Juggling (Transcript of Discussion). Security Protocols Workshop 2008: 172-179 - Feng Hao, Peter Y. A. Ryan:
Password Authenticated Key Exchange by Juggling. Security Protocols Workshop 2008: 159-171 - Matthew Johnson:
A Real World Application of Secure Multi-party Computations (Transcript of Discussion). Security Protocols Workshop 2008: 191-197 - Matthew Johnson, Ralph Owen:
A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates). Security Protocols Workshop 2008: 180-190 - Jan Krhovjak:
Generating Random Numbers in Hostile Environments (Transcript of Discussion). Security Protocols Workshop 2008: 51-53 - Jan Krhovjak, Andriy Stetsko, Vashek Matyas:
Generating Random Numbers in Hostile Environments. Security Protocols Workshop 2008: 38-50 - Wenbo Mao:
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion). Security Protocols Workshop 2008: 115-117 - Jan Meier:
Do Not Model the Attacker. Security Protocols Workshop 2008: 25-35 - Jan Meier:
Do Not Model the Attacker (Transcript of Discussion). Security Protocols Workshop 2008: 36-37 - Steven J. Murdoch:
Hardened Stateless Session Cookies. Security Protocols Workshop 2008: 93-101 - Steven J. Murdoch:
Hardened Stateless Session Cookies (Transcript of Discussion). Security Protocols Workshop 2008: 102-106 - Pekka Nikander:
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion). Security Protocols Workshop 2008: 156-158 - Pekka Nikander, Giannis F. Marias:
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols. Security Protocols Workshop 2008: 144-155 - Michael Roe:
Problems of Provenance for Digital Libraries. Security Protocols Workshop 2008: 126-133