Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2013.bht:"
@inproceedings{DBLP:conf/spw/Almeshekah13, author = {Mohammed H. Almeshekah}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {196--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_23}, doi = {10.1007/978-3-642-41717-7\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Almeshekah13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/AlmeshekahAS13, author = {Mohammed H. Almeshekah and Mikhail J. Atallah and Eugene H. Spafford}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {189--195}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_22}, doi = {10.1007/978-3-642-41717-7\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/AlmeshekahAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BenalohRT13, author = {Josh Benaloh and Peter Y. A. Ryan and Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Postal Voting}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {54--65}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_8}, doi = {10.1007/978-3-642-41717-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BenalohRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bergadano13, author = {Francesco Bergadano}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Communication Setup in Anonymous Messaging}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {161--169}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_18}, doi = {10.1007/978-3-642-41717-7\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bergadano13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bergadano13a, author = {Francesco Bergadano}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Communication Setup in Anonymous Messaging (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {170--175}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_19}, doi = {10.1007/978-3-642-41717-7\_19}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bergadano13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson13, author = {Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Introduction: What's Happening on the Other Channel? (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {1--2}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_1}, doi = {10.1007/978-3-642-41717-7\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor13, author = {Virgil D. Gligor}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {115--122}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_13}, doi = {10.1007/978-3-642-41717-7\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Hao13, author = {Feng Hao}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {255--264}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_29}, doi = {10.1007/978-3-642-41717-7\_29}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Hao13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/HaoCS13, author = {Feng Hao and Dylan Clarke and Carlton Shepherd}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {245--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_28}, doi = {10.1007/978-3-642-41717-7\_28}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/HaoCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/KhuranaN13, author = {Rushil Khurana and Shishir Nagaraja}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {143--151}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_16}, doi = {10.1007/978-3-642-41717-7\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/KhuranaN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Nagaraja13, author = {Shishir Nagaraja}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {152--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_17}, doi = {10.1007/978-3-642-41717-7\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Nagaraja13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ryan13, author = {Peter Y. A. Ryan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Enhancements to Prepare-and-Measure-Based {QKD} Protocols (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {134--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_15}, doi = {10.1007/978-3-642-41717-7\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ryan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RyanC13, author = {Peter Y. A. Ryan and Bruce Christianson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Enhancements to Prepare-and-Measure Based {QKD} Protocols}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {123--133}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_14}, doi = {10.1007/978-3-642-41717-7\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/RyanC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Stulman13, author = {Ariel Stulman}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {213--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_25}, doi = {10.1007/978-3-642-41717-7\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Stulman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/StulmanLS13, author = {Ariel Stulman and Jonathan Lahav and Avraham Shmueli}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {202--212}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_24}, doi = {10.1007/978-3-642-41717-7\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/StulmanLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Svenda13, author = {Petr Svenda}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {On the Origin of Yet another Channel (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {238--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_27}, doi = {10.1007/978-3-642-41717-7\_27}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Svenda13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SvendaM13, author = {Petr Svenda and V{\'{a}}clav Maty{\'{a}}s}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {On the Origin of Yet another Channel}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {223--237}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_26}, doi = {10.1007/978-3-642-41717-7\_26}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SvendaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Teague13, author = {Vanessa Teague}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {End-to-End Verifiable Postal Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {66--70}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_9}, doi = {10.1007/978-3-642-41717-7\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Teague13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Watson13, author = {Robert N. M. Watson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Theory of Application Compartmentalisation (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {28--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_5}, doi = {10.1007/978-3-642-41717-7\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Watson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/WatsonMGANL13, author = {Robert N. M. Watson and Steven J. Murdoch and Khilan Gudka and Jonathan Anderson and Peter G. Neumann and Ben Laurie}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Theory of Application Compartmentalisation}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {19--27}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_4}, doi = {10.1007/978-3-642-41717-7\_4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/WatsonMGANL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Xu13, author = {Rubin Xu}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Stronger Location Integrity (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {180--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_21}, doi = {10.1007/978-3-642-41717-7\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Xu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/XuY13, author = {Rubin Xu and Dongting Yu}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards a Stronger Location Integrity}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {176--179}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_20}, doi = {10.1007/978-3-642-41717-7\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/XuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yan13, author = {Jeff Yan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards New Security Primitives Based on Hard {AI} Problems (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {11--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_3}, doi = {10.1007/978-3-642-41717-7\_3}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yasinsac13, author = {Alec Yasinsac}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Independent Computations for Safe Remote Electronic Voting}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {71--83}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_10}, doi = {10.1007/978-3-642-41717-7\_10}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yasinsac13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yasinsac13a, author = {Alec Yasinsac}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {84--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_11}, doi = {10.1007/978-3-642-41717-7\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yasinsac13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yu13, author = {Dongting Yu}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Authentication for Resilience: The Case of {SDN} (Transcript of Discussion)}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {45--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_7}, doi = {10.1007/978-3-642-41717-7\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YuMHA13, author = {Dongting Yu and Andrew W. Moore and Chris Hall and Ross J. Anderson}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Authentication for Resilience: The Case of {SDN}}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {39--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_6}, doi = {10.1007/978-3-642-41717-7\_6}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YuMHA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ZhaoGPN13, author = {Jun Zhao and Virgil D. Gligor and Adrian Perrig and James Newsome}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {94--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_12}, doi = {10.1007/978-3-642-41717-7\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/ZhaoGPN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ZhuY13, author = {Bin B. Zhu and Jeff Yan}, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Towards New Security Primitives Based on Hard {AI} Problems}, booktitle = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, pages = {3--10}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7\_2}, doi = {10.1007/978-3-642-41717-7\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ZhuY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2013, editor = {Bruce Christianson and James A. Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau}, title = {Security Protocols {XXI} - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8263}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41717-7}, doi = {10.1007/978-3-642-41717-7}, isbn = {978-3-642-41716-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.