Abstract is missing.
- Introduction: Alice Doesn't Live Here Anymore (Transcript)Bruce Christianson. 1-3 [doi]
- His Late Master's Voice: Barking for Location PrivacyMike Burmester. 4-14 [doi]
- His Late Master's Voice (Transcript of Discussion)Mike Burmester. 15-24 [doi]
- Can We Fix the Security Economics of Federated Authentication?Ross Anderson. 25-32 [doi]
- Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)Ross Anderson. 33-48 [doi]
- Pico: No More Passwords!Frank Stajano. 49-81 [doi]
- Pico: No More Passwords! (Transcript of Discussion)Frank Stajano. 82-97 [doi]
- Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of PasswordsJoseph Bonneau. 98-104 [doi]
- Getting Web Authentication Right (Transcript of Discussion)Joseph Bonneau. 105-114 [doi]
- When Context Is Better Than Identity: Authentication by Context Using Empirical ChannelsBangdao Chen, Long Hoang Nguyen, A. William Roscoe. 115-125 [doi]
- When Context Is Better Than Identity (Transcript of Discussion)Bangdao Chen. 126-131 [doi]
- Selective Location Blinding Using Hash ChainsGabriele Lenzini, Sjouke Mauw, Jun Pang. 132-141 [doi]
- Selective Location Blinding Using Hash Chains (Transcript of Discussion)Sjouke Mauw. 142-149 [doi]
- Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User InterfacesAlf Zugenmaier. 150-155 [doi]
- Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)Alf Zugenmaier. 156-169 [doi]
- How to Sync with AliceFeng Hao, Peter Y. A. Ryan. 170-178 [doi]
- How to Sync with Alice (Transcript of Discussion)Feng Hao. 179-188 [doi]
- Attack Detection vs. Privacy - How to Find the Link or How to Hide It?Jirí Kur, Vashek Matyas, Andriy Stetsko, Petr Svenda. 189-199 [doi]
- Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion)Jirí Kur, Andriy Stetsko. 200-204 [doi]
- The Sense of Security and a Countermeasure for the False SenseYuko Murayama, Yasuhiro Fujihara, Dai Nishioka. 205-214 [doi]
- The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion)James Malcolm. 215-222 [doi]
- Towards a Theory of Trust in Networks of Humans and ComputersVirgil D. Gligor, Jeannette M. Wing. 223-242 [doi]
- Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)Virgil D. Gligor. 243-257 [doi]
- Gearing Up: How to Eat Your Cryptocake and Still Have ItAlexander V. Shafarenko, Bruce Christianson. 258-259 [doi]
- Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion)Alex Shafarenko. 260-270 [doi]
- Make Noise and Whisper: A Solution to Relay AttacksOmar Choudary, Frank Stajano. 271-283 [doi]
- Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)Omar Choudary. 284-295 [doi]
- Scrambling for Lightweight Censorship ResistanceJoseph Bonneau, Rubin Xu. 296-302 [doi]
- Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)Rubin Xu. 303-312 [doi]
- The Metaplace Security ModelMichael Roe. 313-326 [doi]
- The Metaplace Security Model (Transcript of Discussion)Michael Roe. 327-335 [doi]
- One-Way CryptographySandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, Matt Blaze. 336-340 [doi]
- One-Way Cryptography (Transcript of Discussion)Matt Blaze. 341-358 [doi]
- How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)Jonathan Anderson, Frank Stajano, Robert N. M. Watson. 359-367 [doi]
- How to Keep Bad Papers Out of Conferences (Transcript of Discussion)Jonathan Anderson. 368-380 [doi]