


default search action
21. Security Protocols Workshop 2013: Cambridge, UK
- Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:

Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 - Bruce Christianson:

Introduction: What's Happening on the Other Channel? (Transcript of Discussion). 1-2 - Bin B. Zhu, Jeff Yan:

Towards New Security Primitives Based on Hard AI Problems. 3-10 - Jeff Yan:

Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). 11-18 - Robert N. M. Watson, Steven J. Murdoch

, Khilan Gudka, Jonathan Anderson
, Peter G. Neumann, Ben Laurie:
Towards a Theory of Application Compartmentalisation. 19-27 - Robert N. M. Watson:

Towards a Theory of Application Compartmentalisation (Transcript of Discussion). 28-38 - Dongting Yu, Andrew W. Moore

, Chris Hall, Ross J. Anderson:
Authentication for Resilience: The Case of SDN. 39-44 - Dongting Yu:

Authentication for Resilience: The Case of SDN (Transcript of Discussion). 45-53 - Josh Benaloh, Peter Y. A. Ryan

, Vanessa Teague:
Verifiable Postal Voting. 54-65 - Vanessa Teague:

End-to-End Verifiable Postal Voting (Transcript of Discussion). 66-70 - Alec Yasinsac:

Independent Computations for Safe Remote Electronic Voting. 71-83 - Alec Yasinsac:

Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion). 84-93 - Jun Zhao

, Virgil D. Gligor, Adrian Perrig, James Newsome:
ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets. 94-114 - Virgil D. Gligor:

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion). 115-122 - Peter Y. A. Ryan

, Bruce Christianson
:
Enhancements to Prepare-and-Measure Based QKD Protocols. 123-133 - Peter Y. A. Ryan:

Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). 134-142 - Rushil Khurana, Shishir Nagaraja:

Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks. 143-151 - Shishir Nagaraja:

Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion). 152-160 - Francesco Bergadano

:
Communication Setup in Anonymous Messaging. 161-169 - Francesco Bergadano

:
Communication Setup in Anonymous Messaging (Transcript of Discussion). 170-175 - Rubin Xu, Dongting Yu:

Towards a Stronger Location Integrity. 176-179 - Rubin Xu:

Towards a Stronger Location Integrity (Transcript of Discussion). 180-188 - Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford

:
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. 189-195 - Mohammed H. Almeshekah:

Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion). 196-201 - Ariel Stulman

, Jonathan Lahav, Avraham Shmueli:
Spraying Diffie-Hellman for Secure Key Exchange in MANETs. 202-212 - Ariel Stulman

:
Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion). 213-222 - Petr Svenda

, Václav Matyás:
On the Origin of Yet another Channel. 223-237 - Petr Svenda

:
On the Origin of Yet another Channel (Transcript of Discussion). 238-244 - Feng Hao

, Dylan Clarke, Carlton Shepherd:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. 245-254 - Feng Hao

:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). 255-264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














