Abstract is missing.
- Raven Authentication Service - Attacks and CountermeasuresGraham Rymer, David Llewellyn-Jones. 1-14 [doi]
- Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion)Graham Rymer. 15-23 [doi]
- Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 ImplementationsWanpeng Li, Chris J. Mitchell, Thomas Chen. 24-41 [doi]
- Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion)Wanpeng Li. 42-44 [doi]
- Non-monotonic Security Protocols and Failures in Financial IntermediationFabio Massacci, Chan Nam Ngo, Daniele Venturi 0001, Julian Williams. 45-54 [doi]
- Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)Fabio Massacci. 55-62 [doi]
- HoneyPAKEsJosé Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala. 63-77 [doi]
- HoneyPAKEs (Transcript of Discussion)Peter Y. A. Ryan. 78-83 [doi]
- Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor NetworksLukas Nemec, Radim Ostádal, Vashek Matyas, Petr Svenda. 84-92 [doi]
- Entropy Crowdsourcing - Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion)Lukas Nemec. 93-95 [doi]
- Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security CeremoniesTaciane Martimiano, Jean Everson Martina. 96-105 [doi]
- Daemones Non Operantur Nisi Per Artem - Daemons Do Not Operate Save Through Trickery: Human Tailored Threat Models for Formal Verification of Fail-Safe Security Ceremonies (Transcript of Discussion)Jean Everson Martina. 106-113 [doi]
- Intentionality and Agency in SecurityKat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano. 114-125 [doi]
- Intentionality and Agency in Security (Transcript of Discussion)Kat Krol. 126-131 [doi]
- Incentives in Security ProtocolsSarah Azouvi, Alexander Hicks, Steven J. Murdoch. 132-141 [doi]
- Incentives in Security Protocols (Transcript of Discussion)Steven J. Murdoch. 142-149 [doi]
- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning SystemTudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu. 150-162 [doi]
- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion)Tudor Dumitras. 163-165 [doi]
- How Does Match-Fixing Inform Computer Game Security?Jeff Yan. 166-170 [doi]
- How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion)Jeff Yan. 171-178 [doi]
- From Secure Messaging to Secure CollaborationMartin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford. 179-185 [doi]
- From Secure Messaging to Secure Collaboration (Transcript of Discussion)Martin Kleppmann. 186-191 [doi]
- Requirements for Root of Trust EstablishmentVirgil D. Gligor, Maverick Woo. 192-202 [doi]
- Requirements for Root of Trust Establishment (Transcript of Discussion)Virgil D. Gligor. 203-208 [doi]
- User Authentication for the Internet of ThingsFrank Stajano, T. Mark A. Lomas. 209-213 [doi]
- User Authentication for the Internet of Things (Transcript of Discussion)T. Mark A. Lomas. 214-224 [doi]
- Why Preventing a Cryptocurrency Exchange Heist Isn't Good EnoughPatrick McCorry, Malte Möser, Syed Taha Ali. 225-233 [doi]
- Why Preventing a Cryptocurrency Heist Isn't Good Enough (Transcript of Discussion)Patrick McCorry. 234-242 [doi]
- Making Bitcoin LegalRoss Anderson, Ilia Shumailov, Mansoor Ahmed. 243-253 [doi]
- Making Bitcoin Legal (Transcript of Discussion)Ross Anderson. 254-265 [doi]
- On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't DoJoan Feigenbaum, Daniel J. Weitzner. 266-279 [doi]
- On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion)Daniel J. Weitzner. 280-288 [doi]
- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted DevicesErinn Atwater, Ian Goldberg. 289-294 [doi]
- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)Erinn Atwater, Ian Goldberg. 295-303 [doi]