Abstract is missing.
- Multiple Objectives of Lawful-Surveillance ProtocolsJoan Feigenbaum, Bryan Ford. 1-8 [doi]
- Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)Joan Feigenbaum. 9-17 [doi]
- Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control SystemSimon N. Foley. 18-29 [doi]
- Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion)Simon N. Foley. 30-37 [doi]
- Assuring the Safety of Asymmetric Social ProtocolsVirgil D. Gligor, Frank Stajano. 38-48 [doi]
- Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion)Frank Stajano. 49-59 [doi]
- Simulating Perceptions of SecurityPaul Wernick, Bruce Christianson, Joseph Spring. 60-68 [doi]
- Simulating Perceptions of Security (Transcript of Discussion)Paul Wernick. 69-75 [doi]
- Self Attestation of ThingsPartha Das Chowdhury, Bruce Christianson. 76-84 [doi]
- Self Attestation of Things (Transcript of Discussion)Partha Das Chowdhury. 85-92 [doi]
- Making Decryption AccountableMark Dermot Ryan. 93-98 [doi]
- Making Decryption Accountable (Transcript of Discussion)Mark Dermot Ryan. 99-108 [doi]
- Extending Full Disk Encryption for the FutureMilan Broz. 109-115 [doi]
- Extending Full Disk Encryption for the Future (Transcript of Discussion)Milan Broz. 116-122 [doi]
- Key Exchange with the Help of a Public LedgerThanh Bui, Tuomas Aura. 123-136 [doi]
- Key Exchange with the Help of a Public Ledger (Transcript of Discussion)Thanh Bui. 137-143 [doi]
- Reconciling Multiple Objectives - Politics or Markets?Ross J. Anderson, Khaled Baqer. 144-156 [doi]
- Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion)Ross Anderson. 157-170 [doi]
- The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous OrganizationsFabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams. 171-179 [doi]
- The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion)Chan Nam Ngo. 180-185 [doi]
- A Security Perspective on Publication MetricsHugo Jonker, Sjouke Mauw. 186-200 [doi]
- A Security Perspective on Publication Metrics (Transcript of Discussion)Hugo Jonker. 201-213 [doi]
- Controlling Your Neighbour's Bandwidth for Fun and for ProfitJonathan Weekes, Shishir Nagaraja. 214-223 [doi]
- Controlling Your Neighbour's Bandwidth for Fun and for Profit (Transcript of Discussion)Jonathan Weekes. 224-231 [doi]
- Permanent Reencryption: How to Survive Generations of Cryptanalysts to ComeMarcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Jorge Esteves Veríssimo. 232-237 [doi]
- Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion)Marcus Völp. 238-246 [doi]
- Security from Disjoint Paths: Is It Possible?Sergiu Costea, Marios O. Choudary, Costin Raiciu. 247-253 [doi]
- Security from Disjoint Paths: Is It Possible? (Transcript of Discussion)Marios O. Choudary. 254-259 [doi]
- End to End Security is Not EnoughDylan Clarke, Syed Taha Ali. 260-267 [doi]
- End to End Security is Not Enough (Transcript of Discussion)Dylan Clarke. 268-277 [doi]
- Auditable PAKEs: Approaching Fair Exchange Without a TTPA. W. Roscoe, Peter Y. A. Ryan. 278-297 [doi]
- Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion)Peter Y. A. Ryan. 298-305 [doi]