


default search action
26th Security Protocols Workshop 2018: Cambridge, UK
- Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11286, Springer 2018, ISBN 978-3-030-03250-0 - Graham Rymer, David Llewellyn-Jones:
Raven Authentication Service - Attacks and Countermeasures. 1-14 - Graham Rymer:
Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). 15-23 - Wanpeng Li
, Chris J. Mitchell, Thomas M. Chen
:
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. 24-41 - Wanpeng Li:
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). 42-44 - Fabio Massacci
, Chan Nam Ngo
, Daniele Venturi, Julian Williams:
Non-monotonic Security Protocols and Failures in Financial Intermediation. 45-54 - Fabio Massacci
:
Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). 55-62 - José Becerra, Peter B. Rønne
, Peter Y. A. Ryan
, Petra Sala
:
HoneyPAKEs. 63-77 - Peter Y. A. Ryan
:
HoneyPAKEs (Transcript of Discussion). 78-83 - Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda:
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. 84-92 - Lukas Nemec:
Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). 93-95 - Taciane Martimiano, Jean Everson Martina:
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. 96-105 - Jean Everson Martina:
Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). 106-113 - Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano:
Intentionality and Agency in Security. 114-125 - Kat Krol:
Intentionality and Agency in Security (Transcript of Discussion). 126-131 - Sarah Azouvi, Alexander Hicks, Steven J. Murdoch
:
Incentives in Security Protocols. 132-141 - Steven J. Murdoch
:
Incentives in Security Protocols (Transcript of Discussion). 142-149 - Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu:
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. 150-162 - Tudor Dumitras:
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). 163-165 - Jeff Yan:
How Does Match-Fixing Inform Computer Game Security? 166-170 - Jeff Yan:
How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). 171-178 - Martin Kleppmann
, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford:
From Secure Messaging to Secure Collaboration. 179-185 - Martin Kleppmann
:
From Secure Messaging to Secure Collaboration (Transcript of Discussion). 186-191 - Virgil D. Gligor, Maverick Woo:
Requirements for Root of Trust Establishment. 192-202 - Virgil D. Gligor:
Requirements for Root of Trust Establishment (Transcript of Discussion). 203-208 - Frank Stajano, T. Mark A. Lomas:
User Authentication for the Internet of Things. 209-213 - T. Mark A. Lomas:
User Authentication for the Internet of Things (Transcript of Discussion). 214-224 - Patrick McCorry, Malte Möser, Syed Taha Ali:
Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. 225-233 - Patrick McCorry:
Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). 234-242 - Ross Anderson, Ilia Shumailov, Mansoor Ahmed-Rengers:
Making Bitcoin Legal. 243-253 - Ross Anderson:
Making Bitcoin Legal (Transcript of Discussion). 254-265 - Joan Feigenbaum, Daniel J. Weitzner:
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. 266-279 - Daniel J. Weitzner:
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). 280-288 - Erinn Atwater, Ian Goldberg:
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. 289-294 - Erinn Atwater, Ian Goldberg:
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). 295-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.