The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Security Protocols Workshop"( http://dblp.L3S.de/Venues/Security_Protocols_Workshop )

URL (DBLP): http://dblp.uni-trier.de/db/conf/spw

Publication years (Num. hits)
1996 (18) 1997 (18) 1998 (32) 1999 (20) 2000 (35) 2001 (35) 2002 (21) 2003 (42) 2004 (41) 2005 (45) 2006 (39) 2007 (31) 2008 (34) 2009 (40) 2010 (37) 2011 (37) 2012 (30) 2013 (31) 2014 (38) 2015 (37) 2016 (26) 2017 (34) 2018 (35) 2019 (28) 2020-2023 (27)
Publication types (Num. hits)
inproceedings(786) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 12 occurrences of 11 keywords

Results
Found 811 publication records. Showing 811 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Partha Das Chowdhury Towards Human-Centric Endpoint Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Daniel Hugenroth Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson, Nicholas Boucher If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Frank Stajano Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Agata Kruzikova Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Arastoo Bozorgi, Jonathan Anderson Blind Auditing and Probabilistic Access Controls. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Agata Kruzikova, Vashek Matyas, Milan Broz Authentication of IT Professionals in the Wild - A Survey. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Daniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford Choosing Your Friends: Shaping Ethical Use of Anonymity Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor, Adrian Perrig, David A. Basin Determining an Economic Value of High Assurance for Commodity Software Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Bruce Christianson, Alex Shafarenko Transporting a Secret Using Destructively-Read Memory. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson, Nicholas Boucher If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jenny Blessing One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Christelle Gloor Trusted Introductions for Secure Messaging (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Frank Stajano Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Kieron Ivy Turk Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Alex Shafarenko Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson (eds.) Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid Towards Human-Centric Endpoint Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Harry Halpin Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Adrian Perrig Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Christelle Gloor, Adrian Perrig Trusted Introductions for Secure Messaging. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jenny Blessing, Ross Anderson 0001 One Protocol to Rule Them All? On Securing Interoperable Messaging. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jessica Monteith Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Harry Halpin, Andrei Serjantov Incentives and Censorship Resistance for Mixnets Revisited. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás (eds.) Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov Snitches Get Stitches: On the Difficulty of Whistleblowing. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chan Nam Ngo Affordable Security or Big Guy vs Small Guy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Prashant Anantharaman Mismorphism: The Heart of the Weird Machine (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Laurent Chuat Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001 Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Laurent Chuat, Sarah Plocher, Adrian Perrig Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford Ghost Trace on the Wire? Using Key Evidence for Informed Decisions. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vijay Kothari, Michael C. Millian Human-Computability Boundaries (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sasa Radomirovic Shaping Our Mental Model of Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon N. Foley, Vivien M. Rooney Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vasilios Mavroudis Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith Mismorphism: The Heart of the Weird Machine. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig Evolution of SSL/TLS Indicators and Warnings in Web Browsers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vasilios Mavroudis Bounded Temporal Fairness for FIFO Financial Markets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lydia Kraus Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith Human-Computability Boundaries. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson Challenges in Designing a Distributed Cryptographic File System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alexander Hicks, Steven J. Murdoch Transparency Enhancing Technologies to Make Security Protocols Work for Humans. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Simon N. Foley, Vivien M. Rooney Social Constructionism in Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Steven J. Murdoch Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Diana A. Vasile Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor A Rest Stop on the Unending Road to Provable Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sasa Radomirovic Shaping Our Mental Model of Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor, Maverick Woo Requirements for Root of Trust Establishment. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Graham Rymer, David Llewellyn-Jones Raven Authentication Service - Attacks and Countermeasures. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kat Krol Intentionality and Agency in Security (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Joan Feigenbaum, Daniel J. Weitzner On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1T. Mark A. Lomas User Authentication for the Internet of Things (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukas Nemec Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erinn Atwater, Ian Goldberg Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Malte Möser, Syed Taha Ali Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Patrick McCorry Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Taciane Martimiano, Jean Everson Martina Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ross Anderson 0001, Ilia Shumailov, Mansoor Ahmed-Rengers Making Bitcoin Legal. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano Intentionality and Agency in Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Erinn Atwater, Ian Goldberg Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tudor Dumitras Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.) Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steven J. Murdoch Incentives in Security Protocols (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jeff Yan How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jean Everson Martina Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ross Anderson 0001 Making Bitcoin Legal (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor Requirements for Root of Trust Establishment (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams Non-monotonic Security Protocols and Failures in Financial Intermediation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Frank Stajano, T. Mark A. Lomas User Authentication for the Internet of Things. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan HoneyPAKEs (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel J. Weitzner On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sarah Azouvi, Alexander Hicks, Steven J. Murdoch Incentives in Security Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala HoneyPAKEs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Massacci Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Graham Rymer Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wanpeng Li, Chris J. Mitchell, Thomas M. Chen Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wanpeng Li Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Kleppmann From Secure Messaging to Secure Collaboration (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford From Secure Messaging to Secure Collaboration. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jeff Yan How Does Match-Fixing Inform Computer Game Security? Search on Bibsonomy Security Protocols Workshop The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor, Frank Stajano Assuring the Safety of Asymmetric Social Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thanh Bui, Tuomas Aura Key Exchange with the Help of a Public Ledger. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mark Dermot Ryan Making Decryption Accountable. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter Y. A. Ryan Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul Wernick, Bruce Christianson, Joseph Spring Simulating Perceptions of Security. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hugo Jonker A Security Perspective on Publication Metrics (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi 0001, Julian Williams The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1A. W. Roscoe 0001, Peter Y. A. Ryan Auditable PAKEs: Approaching Fair Exchange Without a TTP. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hugo Jonker, Sjouke Mauw A Security Perspective on Publication Metrics. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 811 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license