


default search action
26th Security Protocols Workshop 2018: Cambridge, UK
- Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson:

Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11286, Springer 2018, ISBN 978-3-030-03250-0 - Graham Rymer, David Llewellyn-Jones:

Raven Authentication Service - Attacks and Countermeasures. 1-14 - Graham Rymer:

Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion). 15-23 - Wanpeng Li

, Chris J. Mitchell, Thomas M. Chen
:
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations. 24-41 - Wanpeng Li:

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion). 42-44 - Fabio Massacci

, Chan Nam Ngo
, Daniele Venturi, Julian Williams:
Non-monotonic Security Protocols and Failures in Financial Intermediation. 45-54 - Fabio Massacci

:
Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion). 55-62 - José Becerra, Peter B. Rønne

, Peter Y. A. Ryan
, Petra Sala
:
HoneyPAKEs. 63-77 - Peter Y. A. Ryan

:
HoneyPAKEs (Transcript of Discussion). 78-83 - Lukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda:

Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks. 84-92 - Lukas Nemec:

Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion). 93-95 - Taciane Martimiano, Jean Everson Martina:

Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies. 96-105 - Jean Everson Martina:

Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion). 106-113 - Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano:

Intentionality and Agency in Security. 114-125 - Kat Krol:

Intentionality and Agency in Security (Transcript of Discussion). 126-131 - Sarah Azouvi, Alexander Hicks, Steven J. Murdoch

:
Incentives in Security Protocols. 132-141 - Steven J. Murdoch

:
Incentives in Security Protocols (Transcript of Discussion). 142-149 - Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu:

Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. 150-162 - Tudor Dumitras:

Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion). 163-165 - Jeff Yan:

How Does Match-Fixing Inform Computer Game Security? 166-170 - Jeff Yan:

How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion). 171-178 - Martin Kleppmann

, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford:
From Secure Messaging to Secure Collaboration. 179-185 - Martin Kleppmann

:
From Secure Messaging to Secure Collaboration (Transcript of Discussion). 186-191 - Virgil D. Gligor, Maverick Woo:

Requirements for Root of Trust Establishment. 192-202 - Virgil D. Gligor:

Requirements for Root of Trust Establishment (Transcript of Discussion). 203-208 - Frank Stajano, T. Mark A. Lomas

:
User Authentication for the Internet of Things. 209-213 - T. Mark A. Lomas:

User Authentication for the Internet of Things (Transcript of Discussion). 214-224 - Patrick McCorry, Malte Möser, Syed Taha Ali:

Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough. 225-233 - Patrick McCorry:

Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion). 234-242 - Ross Anderson, Ilia Shumailov, Mansoor Ahmed-Rengers:

Making Bitcoin Legal. 243-253 - Ross Anderson:

Making Bitcoin Legal (Transcript of Discussion). 254-265 - Joan Feigenbaum, Daniel J. Weitzner:

On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. 266-279 - Daniel J. Weitzner:

On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). 280-288 - Erinn Atwater, Ian Goldberg:

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices. 289-294 - Erinn Atwater, Ian Goldberg:

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). 295-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














