default search action
18. Security Protocols Workshop 2010: Cambridge, UK
- Bruce Christianson, James A. Malcolm:
Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7061, Springer 2014, ISBN 978-3-662-45920-1 - Bruce Christianson:
Introduction: Virtually Perfect Security (Transcript of Discussion). 1-2 - Jan Meier, Dieter Gollmann:
Caught in the Maze of Security Standards. 3 - Dieter Gollmann:
Caught in the Maze of Security Standards (Transcript of Discussion). 4-11 - Sandy Clark, Matt Blaze, Jonathan M. Smith:
Blood in the Water - Are there Honeymoon Effects Outside Software? 12-17 - Sandy Clark:
Blood in the Water (Transcript of Discussion). 18-24 - Joseph Bonneau:
Digital Immolation - New Directions for Online Protest. 25-33 - Joseph Bonneau:
Digital Immolation (Transcript of Discussion). 34-44 - Bruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong:
Relay-Proof Channels Using UWB Lasers. 45-46 - Alex Shafarenko:
Relay-Proof Channels Using UWB Lasers (Transcript of Discussion). 47-53 - Richard Mortier, Anil Madhavapeddy, Theodore Hong, Derek Gordon Murray, Malte Schwarzkopf:
Using Dust Clouds to Enhance Anonymous Communication. 54-59 - Malte Schwarzkopf:
Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion). 60-70 - Michael Roe:
Generating Channel Ids in Virtual World Operating Systems (Extended Abstract). 71-73 - George Danezis:
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion). 74-81 - Stefano Ortolani, Mauro Conti, Bruno Crispo:
Censorship-Resilient Communications through Information Scattering. 82-89 - Mauro Conti:
Censorship-Resilient Communications through Information Scattering (Transcript of Discussion). 90-97 - Jonathan Anderson, Frank Stajano:
On Storing Private Keys in the Cloud. 98-106 - Jonathan Anderson:
On Storing Private Keys in the Cloud (Transcript of Discussion). 107-114 - Partha Das Chowdhury, Bruce Christianson:
More Security or Less Insecurity. 115-119 - Bruce Christianson:
More Security or Less Insecurity (Transcript of Discussion). 120-126 - Ross J. Anderson, Frank Stajano:
It's the Anthropology, Stupid! 127-130 - Ross J. Anderson:
It's the Anthropology, Stupid! (Transcript of Discussion). 131-141 - Su-Yang Yu, Jeff Yan:
Security Design in Human Computation Games. 142-153 - Jeff Yan:
Security Design in Human Computation Games (Transcript of Discussion). 154-160 - Giampaolo Bella, Peter Y. A. Ryan, Vanessa Teague:
Virtually Perfect Democracy. 161-166 - Peter Y. A. Ryan:
Virtually Perfect Democracy (Transcript of Discussion). 167-174 - Sjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan:
Security Protocols for Secret Santa. 175-184 - Sjouke Mauw:
Security Protocols for Secret Santa (Transcript of Discussion). 185-190 - Michael Roe:
Censorship of eBooks (Extended Abstract). 191-199 - Michael Roe:
Censorship of eBooks (Transcript of Discussion). 200-206 - Saad Aloteibi, Frank Stajano:
On the Value of Hybrid Security Testing. 207-213 - Saad Aloteibi:
On the Value of Hybrid Security Testing (Transcript of Discussion). 214-216 - Paulo Veríssimo:
Security Made, Not Perfect, But Automatic. 217-223 - Paulo Veríssimo:
Security Made, Not Perfect, But Automatic (Transcript of Discussion). 224-232 - Virgil D. Gligor:
Security Limitations of Virtualization and How to Overcome Them. 233-251 - Virgil D. Gligor:
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion). 252-265 - Bruce Christianson:
Recapitulation. 266
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.