Abstract is missing.
- Remodelling the Attacker (Transcript of Discussion)Bruce Christianson. 1-2 [doi]
- Fighting the Good Internet WarDaniel Cvrcek, George Danezis. 3-11 [doi]
- Security Protocol Deployment RiskSimon N. Foley, Giampaolo Bella, Stefano Bistarelli. 12-20 [doi]
- Security Protocol Deployment Risk (Transcript of Discussion)Bruce Christianson. 21-24 [doi]
- Do Not Model the AttackerJan Meier. 25-35 [doi]
- Do Not Model the Attacker (Transcript of Discussion)Jan Meier. 36-37 [doi]
- Generating Random Numbers in Hostile EnvironmentsJan Krhovjak, Andriy Stetsko, Vashek Matyas. 38-50 [doi]
- Generating Random Numbers in Hostile Environments (Transcript of Discussion)Jan Krhovjak. 51-53 [doi]
- Cyberdice: Peer-to-Peer Gambling in the Presence of CheatersFrank Stajano, Richard Clayton. 54-70 [doi]
- Cyberdice (Transcript of Discussion)Frank Stajano. 71-83 [doi]
- Problems with Same Origin Policy - Know ThyselfDieter Gollmann. 84-85 [doi]
- Problems with Same Origin Policy (Transcript of Discussion)Dieter Gollmann. 86-92 [doi]
- Hardened Stateless Session CookiesSteven J. Murdoch. 93-101 [doi]
- Hardened Stateless Session Cookies (Transcript of Discussion)Steven J. Murdoch. 102-106 [doi]
- TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud ComputingHaibo Chen, Jun Li, Wenbo Mao. 107-114 [doi]
- TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion)Wenbo Mao. 115-117 [doi]
- Handling New Adversaries in Wireless Ad-Hoc NetworksS. Farshad Bahari, Virgil D. Gligor. 118-119 [doi]
- Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion)Virgil D. Gligor. 120-125 [doi]
- Problems of Provenance for Digital LibrariesMichael Roe. 126-133 [doi]
- Problems of Provenance for Digital Libraries (Transcript of Discussion)Michael Roe. 134-143 [doi]
- Towards Understanding Pure Publish/Subscribe Cryptographic ProtocolsPekka Nikander, Giannis F. Marias. 144-155 [doi]
- Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion)Pekka Nikander. 156-158 [doi]
- Password Authenticated Key Exchange by JugglingFeng Hao, Peter Y. A. Ryan. 159-171 [doi]
- Password Authenticated Key Exchange by Juggling (Transcript of Discussion)Feng Hao. 172-179 [doi]
- A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)Matthew Johnson, Ralph Owen. 180-190 [doi]
- A Real World Application of Secure Multi-party Computations (Transcript of Discussion)Matthew Johnson. 191-197 [doi]
- Covert Communications Despite Traffic Data RetentionGeorge Danezis. 198-214 [doi]
- Covert Communications Despite Traffic Data Retention (Transcript of Discussion)George Danezis. 215-219 [doi]
- What Next after Anonymity?Ross J. Anderson, Steven J. Murdoch. 220-222 [doi]
- What Next After Anonymity? (Transcript of Discussion)Ross J. Anderson. 223-231 [doi]
- Remodelling the Attacker in Voting ProtocolsPeter Y. A. Ryan. 232-234 [doi]
- Remodelling the Attacker in Voting Protocols (Transcript of Discussion)Peter Y. A. Ryan. 235-240 [doi]
- Bridging the Gap between Vulnerabilities and Threats in Electronic Voting - AbstractMatt Blaze, Sandy Clark. 241-243 [doi]
- Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion)Matt Blaze. 244-255 [doi]