Abstract is missing.
- Introduction: Bringing Protocols to Life (Transcript of Discussion)Bruce Christianson. 1-2 [doi]
- Secure Internet Voting Protocol for Overseas Military VotersTodd R. Andel, Alec Yasinsac. 3-14 [doi]
- Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion)Todd R. Andel. 15-22 [doi]
- Self-enforcing Electronic VotingFeng Hao, Brian Randell, Dylan Clarke. 23-31 [doi]
- Self-enforcing Electronic Voting (Transcript of Discussion)Feng Hao. 32-40 [doi]
- Approaches to Modelling Security Scenarios with Domain-Specific LanguagesPhillip J. Brooke, Richard F. Paige, Christopher Power. 41-54 [doi]
- Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion)Phillip J. Brooke. 55-59 [doi]
- The Casino and the OODA Loop - Why Our Protocols Always Eventually FailSandy Clark, Matt Blaze, Jonathan M. Smith. 60-63 [doi]
- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion)Matt Blaze. 64-75 [doi]
- Statistical Metrics for Individual Password StrengthJoseph Bonneau. 76-86 [doi]
- Statistical Metrics for Individual Password Strength (Transcript of Discussion)Joseph Bonneau. 87-95 [doi]
- Street-Level Trust Semantics for Attribute AuthenticationTiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig. 96-115 [doi]
- Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion)Virgil D. Gligor. 116-125 [doi]
- Analysis of Issues and Challenges of E-Voting in the UKDylan Clarke, Feng Hao, Brian Randell. 126-135 [doi]
- Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion)Dylan Clarke. 136-144 [doi]
- Protocol Governance: The Elite, or the Mob?Ross Anderson. 145 [doi]
- Protocol Governance: The Elite, or the Mob? (Transcript of Discussion)Ross Anderson. 146-160 [doi]
- Usability Issues in SecurityYuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka. 161-171 [doi]
- Usability Issues in Security (Transcript of Discussion)Yuko Murayama. 172-180 [doi]
- Usable Privacy by Visual and Interactive Control of Information FlowShah Mahmood, Yvo Desmedt. 181-188 [doi]
- Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion)Shah Mahmood. 189-198 [doi]
- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking SystemEyĆ¼p S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro. 199-213 [doi]
- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion)Mauro Conti. 214-222 [doi]
- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing DevicesOliver Stannard, Frank Stajano. 223-230 [doi]
- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion)Frank Stajano. 231-241 [doi]
- Stayin' Alive: Aliveness as an Alternative to AuthenticationJonathan Anderson, Robert N. M. Watson. 242-250 [doi]
- Stayin' Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion)Jonathan Anderson. 251-258 [doi]
- Paul Revere ProtocolsPaul Syverson. 259-266 [doi]
- Paul Revere Protocols (Transcript of Discussion)Paul Syverson. 267-275 [doi]