Abstract is missing.
- The Dark Side of the CodeOlgierd Pieczul, Simon N. Foley. 1-11 [doi]
- The Dark Side of the Code (Transcript of Discussion)Simon N. Foley, Olgierd Pieczul. 12-21 [doi]
- Redesigning Secure Protocols to Compel Security ChecksKeith Irwin. 22-29 [doi]
- Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion)Keith Irwin. 30-40 [doi]
- Derailing AttacksSasa Radomirovic, Mohammad Torabi Dashti. 41-46 [doi]
- Derailing Attacks (Transcript of Discussion)Mohammad Torabi Dashti. 47-49 [doi]
- Establishing Software-Only Root of Trust on Embedded Systems: Facts and FictionYanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig. 50-68 [doi]
- Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion)Virgil D. Gligor. 69-79 [doi]
- Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer DronesTavish Vaidya, Micah Sherr. 80-90 [doi]
- Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)Tavish Vaidya, Micah Sherr. 91-104 [doi]
- Location-Private Interstellar CommunicationHugo Jonker, Sjouke Mauw, Sasa Radomirovic. 105-115 [doi]
- Location-Private Interstellar Communication (Transcript of Discussion)Sjouke Mauw. 116-125 [doi]
- The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java InterfaceDaniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor. 126-138 [doi]
- The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)Daniel R. Thomas. 139-144 [doi]
- Challenges of Fiction in Network Security - Perspective of Virtualized EnvironmentsVit Bukac, Radim Ostádal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas. 145-151 [doi]
- Challenges of Fiction in Network Security - Perspective of Virtualised Environments (Transcript of Discussion)Radim Ostádal. 152-157 [doi]
- Device Attacker Models: Fact and FictionJiangshan Yu, Mark Dermot Ryan. 158-167 [doi]
- Device Attacker Models: Fact and Fiction (Transcript of Discussion)Mark Ryan. 168-177 [doi]
- Smearing Fingerprints: Changing the Game of Web Tracking with Composite PrivacySandy Clark, Matt Blaze, Jonathan M. Smith. 178-182 [doi]
- Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion)Sandy Clark. 183-194 [doi]
- Pico Without Public KeysFrank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser. 195-211 [doi]
- Pico Without Public Keys (Transcript of Discussion)Frank Stajano. 212-223 [doi]
- Do You Believe in Tinker Bell? The Social Externalities of TrustKhaled Baqer, Ross Anderson. 224-236 [doi]
- Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion)Khaled Baqer, Ross Anderson. 237-246 [doi]
- Security is BeautifulGiampaolo Bella, Luca Viganò. 247-250 [doi]
- Security is Beautiful (Transcript of Discussion)Luca Viganò. 251-260 [doi]
- On the Use of Security and Privacy Technology as a Plot DeviceJoan Feigenbaum, Brad Rosen. 261-275 [doi]
- On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion)Joan Feigenbaum. 276-282 [doi]
- Bitcoin: Perils of an Unregulated Global P2P CurrencySyed Taha Ali, Dylan Clarke, Patrick McCorry. 283-293 [doi]
- Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)Syed Taha Ali. 294-306 [doi]
- Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past"Paul Wernick, Bruce Christianson. 307-313 [doi]
- Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion)Paul Wernick. 314-324 [doi]
- Information Leakage Due to Revealing Randomly Selected BitsArash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan. 325-341 [doi]
- Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion)Arash Atashpendar. 342-349 [doi]
- Efficient Data Intensive Secure Computation: Fictional or Real?Changyu Dong. 350-360 [doi]
- Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion)Changyu Dong. 361-363 [doi]