default search action
14. Security Protocols Workshop 2006: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 - Bruce Christianson:
Putting the Human Back in the Protocol. 1-2 - Matt Blaze:
Composing Security Metrics. 3-12 - Peter Y. A. Ryan, Thea Peacock:
Putting the Human Back in Voting Protocols. 13-19 - Peter Y. A. Ryan:
Putting the Human Back in Voting Protocols. 20-25 - Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. 26-31 - Srijith K. Nair:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. 32-39 - Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest:
Phish and Chips. 40-48 - Mike Bond:
Phish and Chips. 49-51 - James Heather, Kun Wei:
Where Next for Formal Methods? 52-58 - James Heather:
Where Next for Formal Methods? 59-61 - Per Harald Myrvang, Tage Stabell-Kulø:
Cordial Security Protocol Programming. 62-84 - Tage Stabell-Kulø:
Cordial Security Protocol Programming. 85-96 - Alastair R. Beresford, Jonathan J. Davies, Robert K. Harle:
Privacy-Sensitive Congestion Charging. 97-104 - Alastair R. Beresford:
Privacy-Sensitive Congestion Charging. 105-111 - Daniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis:
The Value of Location Information. 112-121 - Vashek Matyas:
The Value of Location Information. 122-127 - Vashek Matyas:
Update on PIN or Signature. 128-131 - Wenbo Mao, Andrew P. Martin, Hai Jin, Huanguo Zhang:
Innovations for Grid Security from Trusted Computing. 132-149 - Wenbo Mao:
Innovations for Grid Security from Trusted Computing. 150-152 - Ross J. Anderson, Mike Bond:
The Man-in-the-Middle Defence. 153-156 - Ross J. Anderson:
The Man-in-the-Middle Defence. 157-163 - Chris J. Mitchell:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. 164-170 - Chris J. Mitchell:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. 171-176 - Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure Distributed Human Computation. 177-180 - Craig Gentry:
Secure Distributed Human Computation. 181-189 - Jeff Yan:
Bot, Cyborg and Automated Turing Test. 190-197 - Jeff Yan:
Bot, Cyborg and Automated Turing Test. 198-201 - Feng Hao, Piotr Zielinski:
A 2-Round Anonymous Veto Protocol. 202-211 - Feng Hao:
A 2-Round Anonymous Veto Protocol. 212-214 - Lawrence O'Gorman, Lynne Shapiro Brotman, Michael J. Sammon:
How to Speak an Authentication Secret Securely from an Eavesdropper. 215-229 - Lawrence O'Gorman:
How to Speak an Authentication Secret Securely from an Eavesdropper. 230-236 - Hoon Wei Lim, Kenneth G. Paterson:
Secret Public Key Protocols Revisited. 237-256 - Hoon Wei Lim:
Secret Public Key Protocols Revisited. 257-260 - Bruce Christianson, Alexander V. Shafarenko:
Vintage Bit Cryptography. 261-265 - Alexander V. Shafarenko:
Vintage Bit Cryptography. 266-275 - Matthew Johnson, Frank Stajano:
Usability of Security Management: Defining the Permissions of Guests. 276-283 - Matthew Johnson:
Usability of Security Management: Defining the Permissions of Guests. 284-285 - Eve - The Last Word. 286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.