Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Partha Das Chowdhury |
Towards Human-Centric Endpoint Security (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hugenroth |
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya |
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson, Nicholas Boucher |
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Frank Stajano |
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Agata Kruzikova |
Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Arastoo Bozorgi, Jonathan Anderson |
Blind Auditing and Probabilistic Access Controls. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Agata Kruzikova, Vashek Matyas, Milan Broz |
Authentication of IT Professionals in the Wild - A Survey. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford |
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor, Adrian Perrig, David A. Basin |
Determining an Economic Value of High Assurance for Commodity Software Security. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Christianson, Alex Shafarenko |
Transporting a Secret Using Destructively-Read Memory. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson, Nicholas Boucher |
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jenny Blessing |
One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Christelle Gloor |
Trusted Introductions for Secure Messaging (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Frank Stajano |
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Kieron Ivy Turk |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Alex Shafarenko |
Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson (eds.) |
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid |
Towards Human-Centric Endpoint Security. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Harry Halpin |
Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Perrig |
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Christelle Gloor, Adrian Perrig |
Trusted Introductions for Secure Messaging. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jenny Blessing, Ross Anderson 0001 |
One Protocol to Rule Them All? On Securing Interoperable Messaging. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jessica Monteith |
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion). |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Harry Halpin, Andrei Serjantov |
Incentives and Censorship Resistance for Mixnets Revisited. |
Security Protocols Workshop |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás (eds.) |
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers |
Security Protocols Workshop |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor |
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov |
Snitches Get Stitches: On the Difficulty of Whistleblowing. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Chan Nam Ngo |
Affordable Security or Big Guy vs Small Guy (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Prashant Anantharaman |
Mismorphism: The Heart of the Weird Machine (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Laurent Chuat |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov |
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001 |
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Laurent Chuat, Sarah Plocher, Adrian Perrig |
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Kothari, Michael C. Millian |
Human-Computability Boundaries (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sasa Radomirovic |
Shaping Our Mental Model of Security. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, Vivien M. Rooney |
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vasilios Mavroudis |
Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith |
Mismorphism: The Heart of the Weird Machine. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vasilios Mavroudis |
Bounded Temporal Fairness for FIFO Financial Markets. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Lydia Kraus |
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov |
Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith |
Human-Computability Boundaries. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
Challenges in Designing a Distributed Cryptographic File System. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Hicks, Steven J. Murdoch |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov |
Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, Vivien M. Rooney |
Social Constructionism in Security Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Steven J. Murdoch |
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Diana A. Vasile |
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson |
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor |
A Rest Stop on the Unending Road to Provable Security. |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sasa Radomirovic |
Shaping Our Mental Model of Security (Transcript of Discussion). |
Security Protocols Workshop |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor, Maverick Woo |
Requirements for Root of Trust Establishment. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Graham Rymer, David Llewellyn-Jones |
Raven Authentication Service - Attacks and Countermeasures. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kat Krol |
Intentionality and Agency in Security (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Joan Feigenbaum, Daniel J. Weitzner |
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | T. Mark A. Lomas |
User Authentication for the Internet of Things (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Nemec |
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Erinn Atwater, Ian Goldberg |
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrick McCorry, Malte Möser, Syed Taha Ali |
Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Patrick McCorry |
Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Taciane Martimiano, Jean Everson Martina |
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ross Anderson 0001, Ilia Shumailov, Mansoor Ahmed-Rengers |
Making Bitcoin Legal. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano |
Intentionality and Agency in Security. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Erinn Atwater, Ian Goldberg |
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tudor Dumitras |
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.) |
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Steven J. Murdoch |
Incentives in Security Protocols (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Yan |
How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jean Everson Martina |
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ross Anderson 0001 |
Making Bitcoin Legal (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor |
Requirements for Root of Trust Establishment (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams |
Non-monotonic Security Protocols and Failures in Financial Intermediation. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda |
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Frank Stajano, T. Mark A. Lomas |
User Authentication for the Internet of Things. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Peter Y. A. Ryan |
HoneyPAKEs (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Weitzner |
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Azouvi, Alexander Hicks, Steven J. Murdoch |
Incentives in Security Protocols. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala |
HoneyPAKEs. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci |
Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Graham Rymer |
Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wanpeng Li, Chris J. Mitchell, Thomas M. Chen |
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu |
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wanpeng Li |
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Martin Kleppmann |
From Secure Messaging to Secure Collaboration (Transcript of Discussion). |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford |
From Secure Messaging to Secure Collaboration. |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Yan |
How Does Match-Fixing Inform Computer Game Security? |
Security Protocols Workshop |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo |
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor, Frank Stajano |
Assuring the Safety of Asymmetric Social Protocols. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thanh Bui, Tuomas Aura |
Key Exchange with the Help of a Public Ledger. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mark Dermot Ryan |
Making Decryption Accountable. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peter Y. A. Ryan |
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Paul Wernick, Bruce Christianson, Joseph Spring |
Simulating Perceptions of Security. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Jonker |
A Security Perspective on Publication Metrics (Transcript of Discussion). |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi 0001, Julian Williams |
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | A. W. Roscoe 0001, Peter Y. A. Ryan |
Auditable PAKEs: Approaching Fair Exchange Without a TTP. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Jonker, Sjouke Mauw |
A Security Perspective on Publication Metrics. |
Security Protocols Workshop |
2017 |
DBLP DOI BibTeX RDF |
|