![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
14. Security Protocols Workshop 2006: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 - Bruce Christianson:
Putting the Human Back in the Protocol. 1-2 - Matt Blaze:
Composing Security Metrics. 3-12 - Peter Y. A. Ryan
, Thea Peacock:
Putting the Human Back in Voting Protocols. 13-19 - Peter Y. A. Ryan
:
Putting the Human Back in Voting Protocols. 20-25 - Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum
:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. 26-31 - Srijith K. Nair:
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture. 32-39 - Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch
, Ross J. Anderson, Ronald L. Rivest:
Phish and Chips. 40-48 - Mike Bond:
Phish and Chips. 49-51 - James Heather, Kun Wei:
Where Next for Formal Methods? 52-58 - James Heather:
Where Next for Formal Methods? 59-61 - Per Harald Myrvang, Tage Stabell-Kulø:
Cordial Security Protocol Programming. 62-84 - Tage Stabell-Kulø:
Cordial Security Protocol Programming. 85-96 - Alastair R. Beresford, Jonathan J. Davies, Robert K. Harle:
Privacy-Sensitive Congestion Charging. 97-104 - Alastair R. Beresford:
Privacy-Sensitive Congestion Charging. 105-111 - Daniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis:
The Value of Location Information. 112-121 - Vashek Matyas:
The Value of Location Information. 122-127 - Vashek Matyas:
Update on PIN or Signature. 128-131 - Wenbo Mao, Andrew P. Martin
, Hai Jin, Huanguo Zhang:
Innovations for Grid Security from Trusted Computing. 132-149 - Wenbo Mao:
Innovations for Grid Security from Trusted Computing. 150-152 - Ross J. Anderson, Mike Bond:
The Man-in-the-Middle Defence. 153-156 - Ross J. Anderson:
The Man-in-the-Middle Defence. 157-163 - Chris J. Mitchell
:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. 164-170 - Chris J. Mitchell
:
Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries. 171-176 - Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine:
Secure Distributed Human Computation. 177-180 - Craig Gentry:
Secure Distributed Human Computation. 181-189 - Jeff Yan:
Bot, Cyborg and Automated Turing Test. 190-197 - Jeff Yan:
Bot, Cyborg and Automated Turing Test. 198-201 - Feng Hao
, Piotr Zielinski:
A 2-Round Anonymous Veto Protocol. 202-211 - Feng Hao
:
A 2-Round Anonymous Veto Protocol. 212-214 - Lawrence O'Gorman, Lynne Shapiro Brotman, Michael J. Sammon:
How to Speak an Authentication Secret Securely from an Eavesdropper. 215-229 - Lawrence O'Gorman:
How to Speak an Authentication Secret Securely from an Eavesdropper. 230-236 - Hoon Wei Lim, Kenneth G. Paterson:
Secret Public Key Protocols Revisited. 237-256 - Hoon Wei Lim:
Secret Public Key Protocols Revisited. 257-260 - Bruce Christianson
, Alexander V. Shafarenko:
Vintage Bit Cryptography. 261-265 - Alexander V. Shafarenko:
Vintage Bit Cryptography. 266-275 - Matthew Johnson
, Frank Stajano:
Usability of Security Management: Defining the Permissions of Guests. 276-283 - Matthew Johnson
:
Usability of Security Management: Defining the Permissions of Guests. 284-285 - Eve - The Last Word. 286
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.