Security Protocols XX

20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers

ISBN: 978-3-642-35693-3 (Print) 978-3-642-35694-0 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-2

    Introduction: Bringing Protocols to Life (Transcript of Discussion)

  3. No Access

    Book Chapter

    Pages 3-14

    Secure Internet Voting Protocol for Overseas Military Voters

  4. No Access

    Book Chapter

    Pages 15-22

    Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion)

  5. No Access

    Book Chapter

    Pages 23-31

    Self-enforcing Electronic Voting

  6. No Access

    Book Chapter

    Pages 32-40

    Self-enforcing Electronic Voting (Transcript of Discussion)

  7. No Access

    Book Chapter

    Pages 41-54

    Approaches to Modelling Security Scenarios with Domain-Specific Languages

  8. No Access

    Book Chapter

    Pages 55-59

    Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion)

  9. No Access

    Book Chapter

    Pages 60-63

    The Casino and the OODA Loop

  10. No Access

    Book Chapter

    Pages 64-75

    The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion)

  11. No Access

    Book Chapter

    Pages 76-86

    Statistical Metrics for Individual Password Strength

  12. No Access

    Book Chapter

    Pages 87-95

    Statistical Metrics for Individual Password Strength (Transcript of Discussion)

  13. No Access

    Book Chapter

    Pages 96-115

    Street-Level Trust Semantics for Attribute Authentication

  14. No Access

    Book Chapter

    Pages 116-125

    Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion)

  15. No Access

    Book Chapter

    Pages 126-135

    Analysis of Issues and Challenges of E-Voting in the UK

  16. No Access

    Book Chapter

    Pages 136-144

    Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion)

  17. No Access

    Book Chapter

    Pages 145-145

    Protocol Governance: The Elite, or the Mob?

  18. No Access

    Book Chapter

    Pages 146-160

    Protocol Governance: The Elite, or the Mob? (Transcript of Discussion)

  19. No Access

    Book Chapter

    Pages 161-171

    Usability Issues in Security

  20. No Access

    Book Chapter

    Pages 172-180

    Usability Issues in Security (Transcript of Discussion)

  21. No Access

    Book Chapter

    Pages 181-188

    Usable Privacy by Visual and Interactive Control of Information Flow

previous Page of 2