Security Protocols XIX

19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers

ISBN: 978-3-642-25866-4 (Print) 978-3-642-25867-1 (Online)

Table of contents (35 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-3

    Introduction: Alice Doesn’t Live Here Anymore (Transcript)

  3. No Access

    Book Chapter

    Pages 4-14

    His Late Master’s Voice: Barking for Location Privacy

  4. No Access

    Book Chapter

    Pages 15-24

    His Late Master’s Voice (Transcript of Discussion)

  5. No Access

    Book Chapter

    Pages 25-32

    Can We Fix the Security Economics of Federated Authentication?

  6. No Access

    Book Chapter

    Pages 33-48

    Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)

  7. No Access

    Book Chapter

    Pages 49-81

    Pico: No More Passwords!

  8. No Access

    Book Chapter

    Pages 82-97

    Pico: No More Passwords! (Transcript of Discussion)

  9. No Access

    Book Chapter

    Pages 98-104

    Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords

  10. No Access

    Book Chapter

    Pages 105-114

    Getting Web Authentication Right (Transcript of Discussion)

  11. No Access

    Book Chapter

    Pages 115-125

    When Context Is Better Than Identity: Authentication by Context Using Empirical Channels

  12. No Access

    Book Chapter

    Pages 126-131

    When Context Is Better Than Identity (Transcript of Discussion)

  13. No Access

    Book Chapter

    Pages 132-141

    Selective Location Blinding Using Hash Chains

  14. No Access

    Book Chapter

    Pages 142-149

    Selective Location Blinding Using Hash Chains (Transcript of Discussion)

  15. No Access

    Book Chapter

    Pages 150-155

    Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces

  16. No Access

    Book Chapter

    Pages 156-169

    Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)

  17. No Access

    Book Chapter

    Pages 170-178

    How to Sync with Alice

  18. No Access

    Book Chapter

    Pages 179-188

    How to Sync with Alice (Transcript of Discussion)

  19. No Access

    Book Chapter

    Pages 189-199

    Attack Detection vs. Privacy – How to Find the Link or How to Hide It?

  20. No Access

    Book Chapter

    Pages 200-204

    Attack Detection vs Privacy – How to Find the Link or How to Hide It (Transcript of Discussion)

  21. No Access

    Book Chapter

    Pages 205-214

    The Sense of Security and a Countermeasure for the False Sense

previous Page of 2