Abstract is missing.
- Transparency Enhancing Technologies to Make Security Protocols Work for HumansAlexander Hicks, Steven J. Murdoch. 3-10 [doi]
- Transparency Enhancing Technologies to Make Security Protocols Work for Humans (Transcript of Discussion)Steven J. Murdoch. 11-19 [doi]
- Audio CAPTCHA with a Few Cocktails: It's so Noisy I Can't Hear YouBenjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov. 20-40 [doi]
- Audio CAPTCHA with a Few Cocktails: It's So Noisy I Can't Hear You (Transcript of Discussion)Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov. 41-47 [doi]
- Shaping Our Mental Model of SecuritySasa Radomirovic. 51-59 [doi]
- Shaping Our Mental Model of Security (Transcript of Discussion)Sasa Radomirovic. 60-68 [doi]
- Social Constructionism in Security Protocols - A Position on Human Experience, Psychology and SecuritySimon N. Foley, Vivien M. Rooney. 69-81 [doi]
- Social Constructionism in Security Protocols (Transcript of Discussion)Simon N. Foley, Vivien M. Rooney. 82-88 [doi]
- Bounded Temporal Fairness for FIFO Financial MarketsVasilios Mavroudis. 91-103 [doi]
- Bounded Temporal Fairness for FIFO Financial Markets (Transcript of Discussion)Vasilios Mavroudis. 104-112 [doi]
- Mismorphism: The Heart of the Weird MachinePrashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith. 113-124 [doi]
- Mismorphism: The Heart of the Weird Machine (Transcript of Discussion)Prashant Anantharaman. 125-131 [doi]
- Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi 0001. 135-147 [doi]
- Affordable Security or Big Guy vs Small Guy (Transcript of Discussion)Chan Nam Ngo. 148-156 [doi]
- Human-Computability BoundariesVijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith. 157-166 [doi]
- Human-Computability Boundaries (Transcript of Discussion)Vijay Kothari, Michael C. Millian. 167-174 [doi]
- Challenges in Designing a Distributed Cryptographic File SystemArastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson. 177-192 [doi]
- Challenges in Designing a Distributed Cryptographic File System (Transcript of Discussion)Arastoo Bozorgi, Mahya Soleimani Jadidi, Jonathan Anderson. 193-199 [doi]
- Zero-Knowledge User Authentication: An Old Idea Whose Time Has ComeLaurent Chuat, Sarah Plocher, Adrian Perrig. 203-212 [doi]
- Zero-Knowledge User Authentication: An Old Idea Whose Time Has Come (Transcript of Discussion)Laurent Chuat. 213-222 [doi]
- A Rest Stop on the Unending Road to Provable SecurityVirgil D. Gligor. 223-232 [doi]
- A Rest Stop on the Unending Road to Provable Security (Transcript of Discussion)Virgil D. Gligor. 233-241 [doi]
- Ghost Trace on the Wire? Using Key Evidence for Informed DecisionsDiana A. Vasile, Martin Kleppmann, Daniel R. Thomas, Alastair R. Beresford. 245-257 [doi]
- Ghost Trace on the Wire? Using Key Evidence for Informed Decisions (Transcript of Discussion)Diana A. Vasile. 258-263 [doi]
- Evolution of SSL/TLS Indicators and Warnings in Web BrowsersLydia Kraus, Martin Ukrop, Vashek Matyas, Tobias Fiebig. 267-280 [doi]
- Evolution of SSL/TLS Indicators and Warnings in Web Browsers (Transcript of Discussion)Lydia Kraus. 281-288 [doi]
- Snitches Get Stitches: On the Difficulty of WhistleblowingMansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov. 289-303 [doi]
- Snitches Get Stitches: On the Difficulty of Whistleblowing (Transcript of Discussion)Mansoor Ahmed-Rengers, Ross J. Anderson, Darija Halatova, Ilia Shumailov. 304-312 [doi]