Search dblp for Publications

export results for "toc:db/conf/spw/spw2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/spw/Almeshekah13,
  author       = {Mohammed H. Almeshekah},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Back Channels Can Be Useful! - Layering Authentication Channels to
                  Provide Covert Communication (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {196--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_23},
  doi          = {10.1007/978-3-642-41717-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Almeshekah13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/AlmeshekahAS13,
  author       = {Mohammed H. Almeshekah and
                  Mikhail J. Atallah and
                  Eugene H. Spafford},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Back Channels Can Be Useful! - Layering Authentication Channels to
                  Provide Covert Communication},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {189--195},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_22},
  doi          = {10.1007/978-3-642-41717-7\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/AlmeshekahAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BenalohRT13,
  author       = {Josh Benaloh and
                  Peter Y. A. Ryan and
                  Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Postal Voting},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_8},
  doi          = {10.1007/978-3-642-41717-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BenalohRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bergadano13,
  author       = {Francesco Bergadano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Communication Setup in Anonymous Messaging},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {161--169},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_18},
  doi          = {10.1007/978-3-642-41717-7\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bergadano13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bergadano13a,
  author       = {Francesco Bergadano},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Communication Setup in Anonymous Messaging (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {170--175},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_19},
  doi          = {10.1007/978-3-642-41717-7\_19},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bergadano13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson13,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Introduction: What's Happening on the Other Channel? (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_1},
  doi          = {10.1007/978-3-642-41717-7\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor13,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {115--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_13},
  doi          = {10.1007/978-3-642-41717-7\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Hao13,
  author       = {Feng Hao},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {255--264},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_29},
  doi          = {10.1007/978-3-642-41717-7\_29},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Hao13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/HaoCS13,
  author       = {Feng Hao and
                  Dylan Clarke and
                  Carlton Shepherd},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Verifiable Classroom Voting: Where Cryptography Meets Pedagogy},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {245--254},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_28},
  doi          = {10.1007/978-3-642-41717-7\_28},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/HaoCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/KhuranaN13,
  author       = {Rushil Khurana and
                  Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {143--151},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_16},
  doi          = {10.1007/978-3-642-41717-7\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/KhuranaN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Nagaraja13,
  author       = {Shishir Nagaraja},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {152--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_17},
  doi          = {10.1007/978-3-642-41717-7\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Nagaraja13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ryan13,
  author       = {Peter Y. A. Ryan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Enhancements to Prepare-and-Measure-Based {QKD} Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {134--142},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_15},
  doi          = {10.1007/978-3-642-41717-7\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ryan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RyanC13,
  author       = {Peter Y. A. Ryan and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Enhancements to Prepare-and-Measure Based {QKD} Protocols},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {123--133},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_14},
  doi          = {10.1007/978-3-642-41717-7\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RyanC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Stulman13,
  author       = {Ariel Stulman},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_25},
  doi          = {10.1007/978-3-642-41717-7\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Stulman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/StulmanLS13,
  author       = {Ariel Stulman and
                  Jonathan Lahav and
                  Avraham Shmueli},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Spraying Diffie-Hellman for Secure Key Exchange in MANETs},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {202--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_24},
  doi          = {10.1007/978-3-642-41717-7\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/StulmanLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Svenda13,
  author       = {Petr Svenda},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {On the Origin of Yet another Channel (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {238--244},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_27},
  doi          = {10.1007/978-3-642-41717-7\_27},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Svenda13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SvendaM13,
  author       = {Petr Svenda and
                  V{\'{a}}clav Maty{\'{a}}s},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {On the Origin of Yet another Channel},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_26},
  doi          = {10.1007/978-3-642-41717-7\_26},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SvendaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Teague13,
  author       = {Vanessa Teague},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {End-to-End Verifiable Postal Voting (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {66--70},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_9},
  doi          = {10.1007/978-3-642-41717-7\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Teague13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Watson13,
  author       = {Robert N. M. Watson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Theory of Application Compartmentalisation (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_5},
  doi          = {10.1007/978-3-642-41717-7\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Watson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/WatsonMGANL13,
  author       = {Robert N. M. Watson and
                  Steven J. Murdoch and
                  Khilan Gudka and
                  Jonathan Anderson and
                  Peter G. Neumann and
                  Ben Laurie},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Theory of Application Compartmentalisation},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {19--27},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_4},
  doi          = {10.1007/978-3-642-41717-7\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/WatsonMGANL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Xu13,
  author       = {Rubin Xu},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Stronger Location Integrity (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {180--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_21},
  doi          = {10.1007/978-3-642-41717-7\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Xu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/XuY13,
  author       = {Rubin Xu and
                  Dongting Yu},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards a Stronger Location Integrity},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {176--179},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_20},
  doi          = {10.1007/978-3-642-41717-7\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/XuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yan13,
  author       = {Jeff Yan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards New Security Primitives Based on Hard {AI} Problems (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {11--18},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_3},
  doi          = {10.1007/978-3-642-41717-7\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yan13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yasinsac13,
  author       = {Alec Yasinsac},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Independent Computations for Safe Remote Electronic Voting},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_10},
  doi          = {10.1007/978-3-642-41717-7\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yasinsac13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yasinsac13a,
  author       = {Alec Yasinsac},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Independent Computations for Safe Remote Electronic Voting (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {84--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_11},
  doi          = {10.1007/978-3-642-41717-7\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yasinsac13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yu13,
  author       = {Dongting Yu},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Authentication for Resilience: The Case of {SDN} (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {45--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_7},
  doi          = {10.1007/978-3-642-41717-7\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YuMHA13,
  author       = {Dongting Yu and
                  Andrew W. Moore and
                  Chris Hall and
                  Ross J. Anderson},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Authentication for Resilience: The Case of {SDN}},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {39--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_6},
  doi          = {10.1007/978-3-642-41717-7\_6},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YuMHA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ZhaoGPN13,
  author       = {Jun Zhao and
                  Virgil D. Gligor and
                  Adrian Perrig and
                  James Newsome},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {94--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_12},
  doi          = {10.1007/978-3-642-41717-7\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/ZhaoGPN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ZhuY13,
  author       = {Bin B. Zhu and
                  Jeff Yan},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Towards New Security Primitives Based on Hard {AI} Problems},
  booktitle    = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  pages        = {3--10},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7\_2},
  doi          = {10.1007/978-3-642-41717-7\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ZhuY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spw/2013,
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson and
                  Joseph Bonneau},
  title        = {Security Protocols {XXI} - 21st International Workshop, Cambridge,
                  UK, March 19-20, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8263},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41717-7},
  doi          = {10.1007/978-3-642-41717-7},
  isbn         = {978-3-642-41716-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics