Abstract is missing.
- Why Bother Securing DNS?Dieter Gollmann. 1-8 [doi]
- Why Bother Securing DNS? (Transcript of Discussion)Dieter Gollmann. 9-17 [doi]
- Collaborating as Normal: Detecting Systemic Anomalies in Your PartnerOlgierd Pieczul, Simon N. Foley. 18-27 [doi]
- Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion)Simon N. Foley. 28-37 [doi]
- Remark!: A Secure Protocol for Remote ExamsRosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan. 38-48 [doi]
- Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion)Rosario Giustolisi. 49-54 [doi]
- Red Queen's Race: APT Win-Win GameVit Bukac, Vaclav Lorenc, Vashek Matyás. 55-61 [doi]
- Red Queen's Race: APT Win-Win Game (Transcript of Discussion)Vit Bukac. 62-68 [doi]
- Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)Michele Peroli, Luca Viganò, Matteo Zavatteri. 69-90 [doi]
- Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)Luca Viganò. 91-99 [doi]
- Dancing with the Adversary: A Tale of Wimps and GiantsVirgil D. Gligor. 100-115 [doi]
- Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion)Virgil D. Gligor. 116-129 [doi]
- Better Authentication: Password Revolution by EvolutionDaniel R. Thomas, Alastair R. Beresford. 130-145 [doi]
- Better Authentication Password Revolution by Evolution (Transcript of Discussion)Daniel R. Thomas. 146-153 [doi]
- Collaborating with the Enemy on Network ManagementChris Hall, Dongting Yu, Zhi-Li Zhang, Jonathan Stout, Andrew M. Odlyzko, Andrew W. Moore, L. Jean Camp, Kevin Benton, Ross Anderson. 154-162 [doi]
- Collaborating with the Enemy on Network Management (Transcript of Discussion)Ross Anderson, Chris Hall. 163-171 [doi]
- Bootstrapping Adoption of the Pico Password Replacement SystemFrank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington. 172-186 [doi]
- Bootstrapping Adoption of the Pico Password Replacement System (Transcript of Discussion)Frank Stajano. 187-196 [doi]
- I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication SchemesGraeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano. 197-215 [doi]
- Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion)Max Spencer. 216-220 [doi]
- Censorship Resistance as a Side-EffectHenry Tan, Micah Sherr. 221-226 [doi]
- Censorship Resistance as a Side-Effect (Transcript of Discussion)Henry Tan, Micah Sherr. 227-238 [doi]
- On the Feasibility of a Technological Response to the Surveillance MorassJoan Feigenbaum, Jérémie Koenig. 239-252 [doi]
- On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion)Joan Feigenbaum, Jérémie Koenig. 253-262 [doi]
- Strange Bedfellows: How and When to Work with Your EnemyAaron D. Jaggard, Rebecca N. Wright. 263-267 [doi]
- Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion)Rebecca N. Wright. 268-275 [doi]
- On the Key Role Intelligence Agencies Can Play to Restore Our Democratic InstitutionsYvo Desmedt. 276-285 [doi]
- On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion)Yvo Desmedt. 286-299 [doi]
- On Node Capturing Attacker StrategiesFilip Jurnecka, Martin Stehlík, Vashek Matyás. 300-315 [doi]
- On Node Capturing Attacker Strategies (Transcript of Discussion)Filip Jurnecka. 316-320 [doi]
- On the Reliability of Network Measurement Techniques Used for Malware Traffic AnalysisJoseph Gardiner, Shishir Nagaraja. 321-333 [doi]
- On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion)Shishir Nagaraja. 334-339 [doi]
- Beyond TrustPartha Das Chowdhury, Bruce Christianson. 340-344 [doi]
- Beyond Trust (Transcript of Discussion)Partha Das Chowdhury. 345-349 [doi]
- Fawkescoin - A Cryptocurrency Without Public-Key CryptographyJoseph Bonneau, Andrew Miller. 350-358 [doi]
- FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion)Joseph Bonneau. 359-370 [doi]