default search action
16. Security Protocols Workshop 2008: Cambridge, UK
- Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Lecture Notes in Computer Science 6615, Springer 2011, ISBN 978-3-642-22136-1 - Bruce Christianson:
Remodelling the Attacker (Transcript of Discussion). 1-2 - Daniel Cvrcek, George Danezis:
Fighting the 'Good' Internet War. 3-11 - Simon N. Foley, Giampaolo Bella, Stefano Bistarelli:
Security Protocol Deployment Risk. 12-20 - Bruce Christianson:
Security Protocol Deployment Risk (Transcript of Discussion). 21-24 - Jan Meier:
Do Not Model the Attacker. 25-35 - Jan Meier:
Do Not Model the Attacker (Transcript of Discussion). 36-37 - Jan Krhovjak, Andriy Stetsko, Vashek Matyas:
Generating Random Numbers in Hostile Environments. 38-50 - Jan Krhovjak:
Generating Random Numbers in Hostile Environments (Transcript of Discussion). 51-53 - Frank Stajano, Richard Clayton:
Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters. 54-70 - Frank Stajano:
Cyberdice (Transcript of Discussion). 71-83 - Dieter Gollmann:
Problems with Same Origin Policy - Know Thyself. 84-85 - Dieter Gollmann:
Problems with Same Origin Policy (Transcript of Discussion). 86-92 - Steven J. Murdoch:
Hardened Stateless Session Cookies. 93-101 - Steven J. Murdoch:
Hardened Stateless Session Cookies (Transcript of Discussion). 102-106 - Haibo Chen, Jun Li, Wenbo Mao:
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing. 107-114 - Wenbo Mao:
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion). 115-117 - S. Farshad Bahari, Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks. 118-119 - Virgil D. Gligor:
Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion). 120-125 - Michael Roe:
Problems of Provenance for Digital Libraries. 126-133 - Michael Roe:
Problems of Provenance for Digital Libraries (Transcript of Discussion). 134-143 - Pekka Nikander, Giannis F. Marias:
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols. 144-155 - Pekka Nikander:
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion). 156-158 - Feng Hao, Peter Y. A. Ryan:
Password Authenticated Key Exchange by Juggling. 159-171 - Feng Hao:
Password Authenticated Key Exchange by Juggling (Transcript of Discussion). 172-179 - Matthew Johnson, Ralph Owen:
A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates). 180-190 - Matthew Johnson:
A Real World Application of Secure Multi-party Computations (Transcript of Discussion). 191-197 - George Danezis:
Covert Communications Despite Traffic Data Retention. 198-214 - George Danezis:
Covert Communications Despite Traffic Data Retention (Transcript of Discussion). 215-219 - Ross J. Anderson, Steven J. Murdoch:
What Next after Anonymity? 220-222 - Ross J. Anderson:
What Next After Anonymity? (Transcript of Discussion). 223-231 - Peter Y. A. Ryan:
Remodelling the Attacker in Voting Protocols. 232-234 - Peter Y. A. Ryan:
Remodelling the Attacker in Voting Protocols (Transcript of Discussion). 235-240 - Matt Blaze, Sandy Clark:
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - Abstract. 241-243 - Matt Blaze:
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion). 244-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.