Abstract is missing.
- Introduction: What's Happening on the Other Channel? (Transcript of Discussion)Bruce Christianson. 1-2 [doi]
- Towards New Security Primitives Based on Hard AI ProblemsBin B. Zhu, Jeff Yan. 3-10 [doi]
- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion)Jeff Yan. 11-18 [doi]
- Towards a Theory of Application CompartmentalisationRobert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie. 19-27 [doi]
- Towards a Theory of Application Compartmentalisation (Transcript of Discussion)Robert N. M. Watson. 28-38 [doi]
- Authentication for Resilience: The Case of SDNDongting Yu, Andrew W. Moore, Chris Hall, Ross Anderson. 39-44 [doi]
- Authentication for Resilience: The Case of SDN (Transcript of Discussion)Dongting Yu. 45-53 [doi]
- Verifiable Postal VotingJosh Benaloh, Peter Y. A. Ryan, Vanessa Teague. 54-65 [doi]
- End-to-End Verifiable Postal Voting (Transcript of Discussion)Vanessa Teague. 66-70 [doi]
- Independent Computations for Safe Remote Electronic VotingAlec Yasinsac. 71-83 [doi]
- Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion)Alec Yasinsac. 84-93 [doi]
- ReDABLS: Revisiting Device Attestation with Bounded Leakage of SecretsJun Zhao, Virgil D. Gligor, Adrian Perrig, James Newsome. 94-114 [doi]
- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion)Virgil D. Gligor. 115-122 [doi]
- Enhancements to Prepare-and-Measure Based QKD ProtocolsPeter Y. A. Ryan, Bruce Christianson. 123-133 [doi]
- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion)Peter Y. A. Ryan. 134-142 [doi]
- Simple Defences against Vibration-Based Keystroke Fingerprinting AttacksRushil Khurana, Shishir Nagaraja. 143-151 [doi]
- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion)Shishir Nagaraja. 152-160 [doi]
- Communication Setup in Anonymous MessagingFrancesco Bergadano. 161-169 [doi]
- Communication Setup in Anonymous Messaging (Transcript of Discussion)Francesco Bergadano. 170-175 [doi]
- Towards a Stronger Location IntegrityRubin Xu, Dongting Yu. 176-179 [doi]
- Towards a Stronger Location Integrity (Transcript of Discussion)Rubin Xu. 180-188 [doi]
- Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert CommunicationMohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford. 189-195 [doi]
- Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion)Mohammed H. Almeshekah. 196-201 [doi]
- Spraying Diffie-Hellman for Secure Key Exchange in MANETsAriel Stulman, Jonathan Lahav, Avraham Shmueli. 202-212 [doi]
- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion)Ariel Stulman. 213-222 [doi]
- On the Origin of Yet another ChannelPetr Svenda, Václav Matyás. 223-237 [doi]
- On the Origin of Yet another Channel (Transcript of Discussion)Petr Svenda. 238-244 [doi]
- Verifiable Classroom Voting: Where Cryptography Meets PedagogyFeng Hao, Dylan Clarke, Carlton Shepherd. 245-254 [doi]
- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion)Feng Hao. 255-264 [doi]