default search action
17. Security Protocols Workshop 2009: Cambridge, UK
- Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Lecture Notes in Computer Science 7028, Springer 2013, ISBN 978-3-642-36212-5 - Bruce Christianson:
Introduction: Brief Encounters. 1-2 - Jirí Kur, Václav Matyás, Petr Svenda:
Evolutionary Design of Attack Strategies. 3-17 - Petr Svenda:
Evolutionary Design of Attack Strategies. 18-23 - Matt Blaze, Patrick D. McDaniel:
Below the Salt. 24-27 - Matt Blaze:
Is the Honeymoon over? 28-33 - Matt Blaze:
Below the Salt. 34-40 - Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna:
Attacking Each Other. 41-47 - Xavier Chantry:
Attacking Each Other. 48-50 - Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. 51-62 - Stephan Krenn:
Bringing Zero-Knowledge Proofs of Knowledge to Practice. 63-68 - Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan:
Towards a Verified Reference Implementation of a Trusted Platform Module. 69-81 - Aybek Mukhamedov:
Towards a Verified Reference Implementation of a Trusted Platform Module. 82-86 - George Danezis:
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. 87-92 - George Danezis:
The Least Privacy-Damaging Centralised Traffic Data Retention Architecture. 93-110 - Peter Y. A. Ryan, Vanessa Teague:
Pretty Good Democracy. 111-130 - Peter Y. A. Ryan:
Pretty Good Democracy. 131-142 - Michael Backes, Matteo Maffei:
Design and Verification of Anonymous Trust Protocols. 143-148 - Michael Backes:
Design and Verification of Anonymous Trust Protocols. 149-156 - Virgil D. Gligor, Adrian Perrig, Jun Zhao:
Brief Encounters with a Random Key Graph. 157-161 - Virgil D. Gligor:
Brief Encounters with a Random Key Graph. 162-170 - Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Trust*: Using Local Guarantees to Extend the Reach of Trust. 171-178 - Bruce Christianson:
Trust*: Using Local Guarantees to Extend the Reach of Trust. 179-188 - Joseph Bonneau:
Alice and Bob in Love. 189-198 - Joseph Bonneau:
Alice and Bob in Love. 199-212 - Paul Syverson:
Why I'm Not an Entropist. 213-230 - Paul Syverson:
Why I'm Not an Entropist. 231-239 - Dusko Pavlovic, Catherine Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. 240-261 - Catherine Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. 262-268 - Chris J. Mitchell:
A Novel Stateless Authentication Protocol. 269-274 - Chris J. Mitchell:
A Novel Stateless Authentication Protocol. 275-281 - Ross J. Anderson:
The Trust Economy of Brief Encounters. 282-284 - Ross J. Anderson:
The Trust Economy of Brief Encounters. 285-297 - Simon N. Foley, Vivien M. Rooney:
Qualitative Analysis for Trust Management. 298-307 - Simon N. Foley:
Qualitative Analysis for Trust Management. 308-320 - Sören Preibusch, Alastair R. Beresford:
Establishing Distributed Hidden Friendship Relations. 321-334 - Sören Preibusch:
Establishing Distributed Hidden Friendship Relations. 335-342 - Jonathan Anderson, Frank Stajano:
Not That Kind of Friend. 343-349 - Jonathan Anderson:
Not That Kind of Friend. 350-364 - Orson Scott Card:
The Final Word. 365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.