default search action
15. Security Protocols Workshop 2007: Brno, Czech Republic
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 - Bruce Christianson:
When Is a Protocol Broken? (Transcript of Discussion). 1-2 - Micah Sherr, Eric Cronin, Matt Blaze:
Measurable Security through Isotropic Channels. 3-12 - Micah Sherr:
Measurable Security through Isotropic Channels (Transcript of Discussion). 13-19 - Amerson Lin, Mike Bond, Jolyon Clulow:
Modeling Partial Attacks with Alloy. 20-33 - Amerson Lin:
Modeling Partial Attacks with Alloy (Transcript of Discussion). 34-36 - Marcus C. Granado:
Resiliency Aspects of Security Protocols. 37-57 - Shishir Nagaraja:
Privacy Amplification with Social Networks. 58-73 - Shishir Nagaraja:
Privacy Amplification with Social Networks (Transcript of Discussion). 74-80 - Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski:
Reconciling Multiple IPsec and Firewall Policies. 81-97 - Michael Roe:
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion). 98-103 - Alf Zugenmaier, Julien Laganier, Anand R. Prasad, Kristian Slavov:
Anchor-Less Secure Session Mobility. 104-109 - Alf Zugenmaier:
Anchor-Less Secure Session Mobility (Transcript of Discussion). 110-113 - Thomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan:
A Model for System-Based Analysis of Voting Systems. 114-130 - Thomas Tjøstheim:
A Model for System-Based Analysis of Voting Systems (Transcript of Discussion). 131-132 - Bruce Christianson, Jun Li:
Multi-Channel Key Agreement Using Encrypted Public Key Exchange. 133-138 - Bruce Christianson:
Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion). 139-146 - Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross J. Anderson, Ronald L. Rivest:
On the Security of the EMV Secure Messaging API (Extended Abstract). 147-149 - Jolyon Clulow:
On the Security of the EMV Secure Messaging API (Transcript of Discussion). 150-151 - Jaap-Henk Hoepman:
Distributed Double Spending Prevention. 152-165 - Jaap-Henk Hoepman:
Distributed Double Spending Prevention (Transcript of Discussion). 166-170 - Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, Ross J. Anderson:
Robbing the Bank with a Theorem Prover - (Abstract). 171 - Jolyon Clulow:
Robbing the Bank with a Theorem Prover - (Transcript of Discussion). 172-177 - Haruno Kataoka, Akira Utsumi, Yuki Hirose, Hiroshi Yoshiura:
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet. 178-188 - Hiroshi Yoshiura:
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion). 189-190 - Alec Yasinsac, Jeffrey Todd McDonald:
Towards Working with Small Atomic Functions. 191-200 - Alec Yasinsac:
Towards Working with Small Atomic Functions - (Transcript of Discussion). 201-203 - Wenbo Mao, Fei Yan, Chuanjiang Yi, Haibo Chen:
Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment. 204-221 - George Danezis, Ben Laurie:
Private Yet Abuse Resistant Open Publishing. 222-243 - George Danezis:
Private Yet Abuse Resistant Open Publishing (Transcript of Discussion). 244-255 - Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. 256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.