Abstract is missing.
- Invisible SecurityGiampaolo Bella, Bruce Christianson, Luca Viganò 0001. 1-9 [doi]
- Invisible Security (Transcript of Discussion)Giampaolo Bella. 10-18 [doi]
- Man-in-the-Middle Attacks Evolved... but Our Security Models Didn'tHugo L. Jonker, Sjouke Mauw, Rolando Trujillo-Rasua. 19-25 [doi]
- Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't (Transcript of Discussion)Hugo Jonker. 26-34 [doi]
- The Price of Belief: Insuring Credible Trust?Paul Wernick, Bruce Christianson. 35-38 [doi]
- The Price of Belief: Insuring Credible Trust? (Transcript of Discussion)Bruce Christianson. 39-46 [doi]
- Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding IncidentsMin-Suk Kang, Virgil D. Gligor, Vyas Sekar. 47-57 [doi]
- Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents (Transcript of Discussion)Virgil D. Gligor. 58-66 [doi]
- The Evolution of a Security ControlOlgierd Pieczul, Simon N. Foley. 67-84 [doi]
- The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion)Olgierd Pieczul, Simon N. Foley. 85-89 [doi]
- Novel Security and Privacy Perspectives of Camera FingerprintsJeff Yan. 90-95 [doi]
- Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion)Jeff Yan. 96-102 [doi]
- Exploiting Autocorrect to Attack PrivacyBrian J. Kidney, Jonathan Anderson. 103-109 [doi]
- Exploiting Autocorrect to Attack Privacy (Transcript of Discussion)Brian J. Kidney. 110-118 [doi]
- SMAPs: Short Message Authentication ProtocolsKhaled Baqer, S. Johann Bezuidenhoudt, Ross J. Anderson, Markus G. Kuhn. 119-132 [doi]
- SMAPs: Short Message Authentication Protocols (Transcript of Discussion)Khaled Baqer, Ross J. Anderson. 133-140 [doi]
- Explicit Delegation Using Configurable CookiesDavid Llewellyn-Jones, Graeme Jenkinson, Frank Stajano. 141-152 [doi]
- Explicit Delegation Using Configurable Cookies (Transcript of Discussion)David Llewellyn-Jones. 153-164 [doi]
- Red Button and Yellow Button: Usable Security for Lost Security TokensIan Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano. 165-171 [doi]
- Red Button and Yellow Button: Usable Security for Lost Security Tokens (Transcript of Discussion)Frank Stajano. 172-180 [doi]
- Detecting Failed Attacks on Human-Interactive Security ProtocolsA. W. Roscoe. 181-197 [doi]
- Detecting Failed Attacks on Human-Interactive Security Protocols (Transcript of Discussion)A. W. Roscoe. 198-205 [doi]
- Malicious Clients in Distributed Secret Sharing Based Storage NetworksAndreas Happe, Stephan Krenn, Thomas Lorünser. 206-214 [doi]
- Malicious Clients in Distributed Secret Sharing Based Storage Networks (Transcript of Discussion)Andreas Happe. 215-218 [doi]
- Reconsidering Attacker Models in Ad-Hoc NetworksRadim Ostádal, Petr Svenda, Vashek Matyás. 219-227 [doi]
- Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion)Petr Svenda. 228-231 [doi]