​
Login / Signup
Security Protocols Workshop
1996
2006
2011
2023
1996
2023
Keyphrases
Publications
2023
Bruce Christianson
,
Alex Shafarenko
Transporting a Secret Using Destructively-Read Memory.
Security Protocols Workshop
(2023)
Jenny Blessing
One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion).
Security Protocols Workshop
(2023)
Partha Das Chowdhury
Towards Human-Centric Endpoint Security (Transcript of Discussion).
Security Protocols Workshop
(2023)
Kieron Ivy Turk
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion).
Security Protocols Workshop
(2023)
Christelle Gloor
Trusted Introductions for Secure Messaging (Transcript of Discussion).
Security Protocols Workshop
(2023)
Arastoo Bozorgi
,
Jonathan Anderson
Blind Auditing and Probabilistic Access Controls.
Security Protocols Workshop
(2023)
Jessica Monteith
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion).
Security Protocols Workshop
(2023)
Ross J. Anderson
,
Nicholas Boucher
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is Hard.
Security Protocols Workshop
(2023)
Jessica Monteith
,
Oliver Shapcott
,
Anna Talas
,
Pranav Dahiya
Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches.
Security Protocols Workshop
(2023)
Frank Stajano
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion).
Security Protocols Workshop
(2023)
Frank Stajano
Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper).
Security Protocols Workshop
(2023)
Agata Kruzikova
,
Vashek Matyas
,
Milan Broz
Authentication of IT Professionals in the Wild - A Survey.
Security Protocols Workshop
(2023)
Ross J. Anderson
,
Nicholas Boucher
If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion).
Security Protocols Workshop
(2023)
Harry Halpin
Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion).
Security Protocols Workshop
(2023)
Kieron Ivy Turk
,
Alice Hutchings
,
Alastair R. Beresford
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices.
Security Protocols Workshop
(2023)
Alex Shafarenko
Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion).
Security Protocols Workshop
(2023)
Daniel Hugenroth
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion).
Security Protocols Workshop
(2023)
Jenny Blessing
,
Ross Anderson
One Protocol to Rule Them All? On Securing Interoperable Messaging.
Security Protocols Workshop
(2023)
Virgil D. Gligor
,
Adrian Perrig
,
David A. Basin
Determining an Economic Value of High Assurance for Commodity Software Security.
Security Protocols Workshop
(2023)
Agata Kruzikova
Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion).
Security Protocols Workshop
(2023)
Daniel Hugenroth
,
Ceren Kocaogullar
,
Alastair R. Beresford
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks.
Security Protocols Workshop
(2023)
Christelle Gloor
,
Adrian Perrig
Trusted Introductions for Secure Messaging.
Security Protocols Workshop
(2023)
Harry Halpin
,
Andrei Serjantov
Incentives and Censorship Resistance for Mixnets Revisited.
Security Protocols Workshop
(2023)
Adrian Perrig
Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion).
Security Protocols Workshop
(2023)
Jenny Blessing
,
Partha Das Chowdhury
,
Maria Sameen
,
Ross J. Anderson
,
Joseph Gardiner
,
Awais Rashid
Towards Human-Centric Endpoint Security.
Security Protocols Workshop
(2023)
volume 14186, 2023
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers
Security Protocols Workshop
14186 (2023)
volume 12287, 2020
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers
Security Protocols Workshop
12287 (2020)
2019
Mansoor Ahmed-Rengers
,
Ross J. Anderson
,
Darija Halatova
,
Ilia Shumailov
Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion).
Security Protocols Workshop
(2019)
Daniele Friolo
,
Fabio Massacci
,
Chan Nam Ngo
,
Daniele Venturi
Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?
Security Protocols Workshop
(2019)
Laurent Chuat
,
Sarah Plocher
,
Adrian Perrig
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come.
Security Protocols Workshop
(2019)
Laurent Chuat
Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion).
Security Protocols Workshop
(2019)
Chan Nam Ngo
Affordable Security or Big Guy vs Small Guy (Transcript of Discussion).
Security Protocols Workshop
(2019)
Prashant Anantharaman
Mismorphism: The Heart of the Weird Machine (Transcript of Discussion).
Security Protocols Workshop
(2019)
Diana A. Vasile
,
Martin Kleppmann
,
Daniel R. Thomas
,
Alastair R. Beresford
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions.
Security Protocols Workshop
(2019)
Mansoor Ahmed-Rengers
,
Ross J. Anderson
,
Darija Halatova
,
Ilia Shumailov
Snitches Get Stitches: On the Difficulty of Whistleblowing.
Security Protocols Workshop
(2019)
Virgil D. Gligor
A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion).
Security Protocols Workshop
(2019)
Simon N. Foley
,
Vivien M. Rooney
Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and Security.
Security Protocols Workshop
(2019)
Vijay Kothari
,
Michael C. Millian
Human-Computability Boundaries (Transcript of Discussion).
Security Protocols Workshop
(2019)
Simon N. Foley
,
Vivien M. Rooney
Social Constructionism in Security Protocols (Transcript of Discussion).
Security Protocols Workshop
(2019)
Arastoo Bozorgi
,
Mahya Soleimani Jadidi
,
Jonathan Anderson
Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion).
Security Protocols Workshop
(2019)
Benjamin Maximilian Reinheimer
,
Fairooz Islam
,
Ilia Shumailov
Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear You.
Security Protocols Workshop
(2019)
Arastoo Bozorgi
,
Mahya Soleimani Jadidi
,
Jonathan Anderson
Challenges in Designing a Distributed Cryptographic File System.
Security Protocols Workshop
(2019)
Steven J. Murdoch
Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion).
Security Protocols Workshop
(2019)
Diana A. Vasile
Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion).
Security Protocols Workshop
(2019)
Virgil D. Gligor
A Rest Stop on the Unending Road to Provable Security.
Security Protocols Workshop
(2019)
Alexander Hicks
,
Steven J. Murdoch
Transparency Enhancing Technologies to Make Security Protocols Work for Humans.
Security Protocols Workshop
(2019)
Vijay H. Kothari
,
Prashant Anantharaman
,
Ira Ray Jenkins
,
Michael C. Millian
,
J. Peter Brady
,
Sameed Ali
,
Sergey Bratus
,
Jim Blythe
,
Ross Koppel
,
Sean W. Smith
Human-Computability Boundaries.
Security Protocols Workshop
(2019)
Vasilios Mavroudis
Bounded Temporal Fairness for FIFO Financial Markets.
Security Protocols Workshop
(2019)
Lydia Kraus
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion).
Security Protocols Workshop
(2019)
Lydia Kraus
,
Martin Ukrop
,
Vashek Matyas
,
Tobias Fiebig
Evolution of SSL/TLS Indicators and Warnings in Web Browsers.
Security Protocols Workshop
(2019)