Abstract is missing.
- Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Position Paper)Frank Stajano. 3-19 [doi]
- Sleepwalking into Disaster? Requirements Engineering for Digital Cash (Transcript of Discussion)Frank Stajano. 20-31 [doi]
- Transporting a Secret Using Destructively-Read MemoryBruce Christianson, Alex Shafarenko. 32-37 [doi]
- Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion)Alex Shafarenko. 38-42 [doi]
- Authentication of IT Professionals in the Wild - A SurveyAgata Kruzikova, Vashek Matyas, Milan Broz. 43-56 [doi]
- Authentication of IT Professionals in the Wild - A Survey (Transcript of Discussion)Agata Kruzikova. 57-63 [doi]
- Incentives and Censorship Resistance for Mixnets RevisitedHarry Halpin, Andrei Serjantov. 64-69 [doi]
- Incentives and Censorship Resistance for Mixnets Revisited (Transcript of Discussion)Harry Halpin. 70-77 [doi]
- Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking DevicesKieron Ivy Turk, Alice Hutchings, Alastair R. Beresford. 78-88 [doi]
- Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion)Kieron Ivy Turk. 89-96 [doi]
- Who Is Benefiting from Your Fitness Data? A Privacy Analysis of SmartwatchesJessica Monteith, Oliver Shapcott, Anna Talas, Pranav Dahiya. 97-112 [doi]
- Who Is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches (Transcript of Discussion)Jessica Monteith. 113-122 [doi]
- Trusted Introductions for Secure MessagingChristelle Gloor, Adrian Perrig. 123-135 [doi]
- Trusted Introductions for Secure Messaging (Transcript of Discussion)Christelle Gloor. 136-148 [doi]
- Choosing Your Friends: Shaping Ethical Use of Anonymity NetworksDaniel Hugenroth, Ceren Kocaogullar, Alastair R. Beresford. 151-161 [doi]
- Choosing Your Friends: Shaping Ethical Use of Anonymity Networks (Transcript of Discussion)Daniel Hugenroth. 162-173 [doi]
- One Protocol to Rule Them All? On Securing Interoperable MessagingJenny Blessing, Ross Anderson 0001. 174-192 [doi]
- One Protocol to Rule Them All? On Securing Interoperable Messaging (Transcript of Discussion)Jenny Blessing. 193-198 [doi]
- If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure Is HardRoss J. Anderson, Nicholas Boucher. 199-204 [doi]
- If It's Provably Secure, It Probably Isn't: Why Learning from Proof Failure is Hard (Transcript of Discussion)Ross J. Anderson, Nicholas Boucher. 205-210 [doi]
- Towards Human-Centric Endpoint SecurityJenny Blessing, Partha Das Chowdhury, Maria Sameen, Ross J. Anderson, Joseph Gardiner, Awais Rashid. 211-219 [doi]
- Towards Human-Centric Endpoint Security (Transcript of Discussion)Partha Das Chowdhury. 220-227 [doi]
- Determining an Economic Value of High Assurance for Commodity Software SecurityVirgil D. Gligor, Adrian Perrig, David A. Basin. 228-242 [doi]
- Determining an Economic Value of High Assurance for Commodity Software Security (Transcript of Discussion)Adrian Perrig. 243-256 [doi]
- Blind Auditing and Probabilistic Access ControlsArastoo Bozorgi, Jonathan Anderson. 257-269 [doi]