- Michael Roe:
Problems of Provenance for Digital Libraries (Transcript of Discussion). Security Protocols Workshop 2008: 134-143 - Peter Y. A. Ryan:
Remodelling the Attacker in Voting Protocols. Security Protocols Workshop 2008: 232-234 - Peter Y. A. Ryan:
Remodelling the Attacker in Voting Protocols (Transcript of Discussion). Security Protocols Workshop 2008: 235-240 - Frank Stajano:
Cyberdice (Transcript of Discussion). Security Protocols Workshop 2008: 71-83 - Frank Stajano, Richard Clayton:
Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters. Security Protocols Workshop 2008: 54-70