Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2006.bht:"
@proceedings{DBLP:conf/spw/2006, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04904-0}, doi = {10.1007/978-3-642-04904-0}, isbn = {978-3-642-04903-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AdidaBCLMAR06, author = {Ben Adida and Mike Bond and Jolyon Clulow and Amerson Lin and Steven J. Murdoch and Ross J. Anderson and Ronald L. Rivest}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Phish and Chips}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {40--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_7}, doi = {10.1007/978-3-642-04904-0\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AdidaBCLMAR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anderson06, author = {Ross J. Anderson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Man-in-the-Middle Defence}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {157--163}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_21}, doi = {10.1007/978-3-642-04904-0\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anderson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AndersonB06, author = {Ross J. Anderson and Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Man-in-the-Middle Defence}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {153--156}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_20}, doi = {10.1007/978-3-642-04904-0\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/AndersonB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Beresford06, author = {Alastair R. Beresford}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy-Sensitive Congestion Charging}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {105--111}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_14}, doi = {10.1007/978-3-642-04904-0\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Beresford06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BeresfordDH06, author = {Alastair R. Beresford and Jonathan J. Davies and Robert K. Harle}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Privacy-Sensitive Congestion Charging}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {97--104}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_13}, doi = {10.1007/978-3-642-04904-0\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BeresfordDH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Blaze06, author = {Matt Blaze}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Composing Security Metrics}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {3--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_2}, doi = {10.1007/978-3-642-04904-0\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Blaze06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bond06, author = {Mike Bond}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Phish and Chips}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {49--51}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_8}, doi = {10.1007/978-3-642-04904-0\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bond06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson06, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in the Protocol}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {1--2}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_1}, doi = {10.1007/978-3-642-04904-0\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonS06, author = {Bruce Christianson and Alexander V. Shafarenko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Vintage Bit Cryptography}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {261--265}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_34}, doi = {10.1007/978-3-642-04904-0\_34}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/CvrcekKMD06, author = {Daniel Cvrcek and Marek Kumpost and Vashek Matyas and George Danezis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Value of Location Information}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {112--121}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_15}, doi = {10.1007/978-3-642-04904-0\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/CvrcekKMD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gentry06, author = {Craig Gentry}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Distributed Human Computation}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {181--189}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_25}, doi = {10.1007/978-3-642-04904-0\_25}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gentry06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GentryRS06, author = {Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secure Distributed Human Computation}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {177--180}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_24}, doi = {10.1007/978-3-642-04904-0\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GentryRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao06, author = {Feng Hao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A 2-Round Anonymous Veto Protocol}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {212--214}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_29}, doi = {10.1007/978-3-642-04904-0\_29}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoZ06, author = {Feng Hao and Piotr Zielinski}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A 2-Round Anonymous Veto Protocol}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {202--211}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_28}, doi = {10.1007/978-3-642-04904-0\_28}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Heather06, author = {James Heather}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Where Next for Formal Methods?}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {59--61}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_10}, doi = {10.1007/978-3-642-04904-0\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Heather06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HeatherW06, author = {James Heather and Kun Wei}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Where Next for Formal Methods?}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {52--58}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_9}, doi = {10.1007/978-3-642-04904-0\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HeatherW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Johnson06, author = {Matthew Johnson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Usability of Security Management: Defining the Permissions of Guests}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {284--285}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_37}, doi = {10.1007/978-3-642-04904-0\_37}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Johnson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JohnsonS06, author = {Matthew Johnson and Frank Stajano}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Usability of Security Management: Defining the Permissions of Guests}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {276--283}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_36}, doi = {10.1007/978-3-642-04904-0\_36}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/JohnsonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lim06, author = {Hoon Wei Lim}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secret Public Key Protocols Revisited}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {257--260}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_33}, doi = {10.1007/978-3-642-04904-0\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lim06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LimP06, author = {Hoon Wei Lim and Kenneth G. Paterson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Secret Public Key Protocols Revisited}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {237--256}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_32}, doi = {10.1007/978-3-642-04904-0\_32}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LimP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao06, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Innovations for Grid Security from Trusted Computing}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {150--152}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_19}, doi = {10.1007/978-3-642-04904-0\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MaoMJZ06, author = {Wenbo Mao and Andrew P. Martin and Hai Jin and Huanguo Zhang}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Innovations for Grid Security from Trusted Computing}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {132--149}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_18}, doi = {10.1007/978-3-642-04904-0\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MaoMJZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Matyas06, author = {Vashek Matyas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {The Value of Location Information}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {122--127}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_16}, doi = {10.1007/978-3-642-04904-0\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Matyas06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Matyas06a, author = {Vashek Matyas}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Update on {PIN} or Signature}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {128--131}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_17}, doi = {10.1007/978-3-642-04904-0\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Matyas06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell06, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {164--170}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_22}, doi = {10.1007/978-3-642-04904-0\_22}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mitchell06a, author = {Chris J. Mitchell}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {171--176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_23}, doi = {10.1007/978-3-642-04904-0\_23}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mitchell06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MyrvangS06, author = {Per Harald Myrvang and Tage Stabell{-}Kul{\o}}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Cordial Security Protocol Programming}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {62--84}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_11}, doi = {10.1007/978-3-642-04904-0\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MyrvangS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nair06, author = {Srijith K. Nair}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Secure Application-Semantic Aware Policy Enforcement Architecture}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {32--39}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_6}, doi = {10.1007/978-3-642-04904-0\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nair06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NairCT06, author = {Srijith K. Nair and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Towards a Secure Application-Semantic Aware Policy Enforcement Architecture}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {26--31}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_5}, doi = {10.1007/978-3-642-04904-0\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NairCT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OGorman06, author = {Lawrence O'Gorman}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {How to Speak an Authentication Secret Securely from an Eavesdropper}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {230--236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_31}, doi = {10.1007/978-3-642-04904-0\_31}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/OGorman06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/OGormanBS06, author = {Lawrence O'Gorman and Lynne Shapiro Brotman and Michael J. Sammon}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {How to Speak an Authentication Secret Securely from an Eavesdropper}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {215--229}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_30}, doi = {10.1007/978-3-642-04904-0\_30}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/OGormanBS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan06, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in Voting Protocols}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {20--25}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_4}, doi = {10.1007/978-3-642-04904-0\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanP06, author = {Peter Y. A. Ryan and Thea Peacock}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Putting the Human Back in Voting Protocols}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {13--19}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_3}, doi = {10.1007/978-3-642-04904-0\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Shafarenko06, author = {Alexander V. Shafarenko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Vintage Bit Cryptography}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {266--275}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_35}, doi = {10.1007/978-3-642-04904-0\_35}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Shafarenko06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stabell-Kulo06, author = {Tage Stabell{-}Kul{\o}}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Cordial Security Protocol Programming}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {85--96}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_12}, doi = {10.1007/978-3-642-04904-0\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stabell-Kulo06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/X06, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Eve - The Last Word}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {286}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_38}, doi = {10.1007/978-3-642-04904-0\_38}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/X06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan06, author = {Jeff Yan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Bot, Cyborg and Automated Turing Test}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {190--197}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_26}, doi = {10.1007/978-3-642-04904-0\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan06a, author = {Jeff Yan}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Bot, Cyborg and Automated Turing Test}, booktitle = {Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5087}, pages = {198--201}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-642-04904-0\_27}, doi = {10.1007/978-3-642-04904-0\_27}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.