Abstract is missing.
- Introduction: Virtually Perfect Security (Transcript of Discussion)Bruce Christianson. 1-2 [doi]
- Caught in the Maze of Security StandardsJan Meier, Dieter Gollmann. 3 [doi]
- Caught in the Maze of Security Standards (Transcript of Discussion)Dieter Gollmann. 4-11 [doi]
- Blood in the Water - Are there Honeymoon Effects Outside Software?Sandy Clark, Matt Blaze, Jonathan M. Smith. 12-17 [doi]
- Blood in the Water (Transcript of Discussion)Sandy Clark. 18-24 [doi]
- Digital Immolation - New Directions for Online ProtestJoseph Bonneau. 25-33 [doi]
- Digital Immolation (Transcript of Discussion)Joseph Bonneau. 34-44 [doi]
- Relay-Proof Channels Using UWB LasersBruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong. 45-46 [doi]
- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion)Alex Shafarenko. 47-53 [doi]
- Using Dust Clouds to Enhance Anonymous CommunicationRichard Mortier, Anil Madhavapeddy, Theodore Hong, Derek Gordon Murray, Malte Schwarzkopf. 54-59 [doi]
- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion)Malte Schwarzkopf. 60-70 [doi]
- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract)Michael Roe. 71-73 [doi]
- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion)George Danezis. 74-81 [doi]
- Censorship-Resilient Communications through Information ScatteringStefano Ortolani, Mauro Conti, Bruno Crispo. 82-89 [doi]
- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion)Mauro Conti. 90-97 [doi]
- On Storing Private Keys in the CloudJonathan Anderson, Frank Stajano. 98-106 [doi]
- On Storing Private Keys in the Cloud (Transcript of Discussion)Jonathan Anderson. 107-114 [doi]
- More Security or Less InsecurityPartha Das Chowdhury, Bruce Christianson. 115-119 [doi]
- More Security or Less Insecurity (Transcript of Discussion)Bruce Christianson. 120-126 [doi]
- It's the Anthropology, Stupid!Ross J. Anderson, Frank Stajano. 127-130 [doi]
- It's the Anthropology, Stupid! (Transcript of Discussion)Ross J. Anderson. 131-141 [doi]
- Security Design in Human Computation GamesSu-Yang Yu, Jeff Yan. 142-153 [doi]
- Security Design in Human Computation Games (Transcript of Discussion)Jeff Yan. 154-160 [doi]
- Virtually Perfect DemocracyGiampaolo Bella, Peter Y. A. Ryan, Vanessa Teague. 161-166 [doi]
- Virtually Perfect Democracy (Transcript of Discussion)Peter Y. A. Ryan. 167-174 [doi]
- Security Protocols for Secret SantaSjouke Mauw, Sasa Radomirovic, Peter Y. A. Ryan. 175-184 [doi]
- Security Protocols for Secret Santa (Transcript of Discussion)Sjouke Mauw. 185-190 [doi]
- Censorship of eBooks (Extended Abstract)Michael Roe. 191-199 [doi]
- Censorship of eBooks (Transcript of Discussion)Michael Roe. 200-206 [doi]
- On the Value of Hybrid Security TestingSaad Aloteibi, Frank Stajano. 207-213 [doi]
- On the Value of Hybrid Security Testing (Transcript of Discussion)Saad Aloteibi. 214-216 [doi]
- Security Made, Not Perfect, But AutomaticPaulo VerĂssimo. 217-223 [doi]
- Security Made, Not Perfect, But Automatic (Transcript of Discussion)Paulo VerĂssimo. 224-232 [doi]
- Security Limitations of Virtualization and How to Overcome ThemVirgil D. Gligor. 233-251 [doi]
- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion)Virgil D. Gligor. 252-265 [doi]
- RecapitulationBruce Christianson. 266 [doi]