Security Protocols XXI

21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers

ISBN: 978-3-642-41716-0 (Print) 978-3-642-41717-7 (Online)

Table of contents (29 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-2

    Introduction: What’s Happening on the Other Channel? (Transcript of Discussion)

  3. No Access

    Book Chapter

    Pages 3-10

    Towards New Security Primitives Based on Hard AI Problems

  4. No Access

    Book Chapter

    Pages 11-18

    Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion)

  5. No Access

    Book Chapter

    Pages 19-27

    Towards a Theory of Application Compartmentalisation

  6. No Access

    Book Chapter

    Pages 28-38

    Towards a Theory of Application Compartmentalisation (Transcript of Discussion)

  7. No Access

    Book Chapter

    Pages 39-44

    Authentication for Resilience: The Case of SDN

  8. No Access

    Book Chapter

    Pages 45-53

    Authentication for Resilience: The Case of SDN (Transcript of Discussion)

  9. No Access

    Book Chapter

    Pages 54-65

    Verifiable Postal Voting

  10. No Access

    Book Chapter

    Pages 66-70

    End-to-End Verifiable Postal Voting (Transcript of Discussion)

  11. No Access

    Book Chapter

    Pages 71-83

    Independent Computations for Safe Remote Electronic Voting

  12. No Access

    Book Chapter

    Pages 84-93

    Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion)

  13. No Access

    Book Chapter

    Pages 94-114

    ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets

  14. No Access

    Book Chapter

    Pages 115-122

    ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion)

  15. No Access

    Book Chapter

    Pages 123-133

    Enhancements to Prepare-and-Measure Based QKD Protocols

  16. No Access

    Book Chapter

    Pages 134-142

    Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion)

  17. No Access

    Book Chapter

    Pages 143-151

    Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks

  18. No Access

    Book Chapter

    Pages 152-160

    Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion)

  19. No Access

    Book Chapter

    Pages 161-169

    Communication Setup in Anonymous Messaging

  20. No Access

    Book Chapter

    Pages 170-175

    Communication Setup in Anonymous Messaging (Transcript of Discussion)

  21. No Access

    Book Chapter

    Pages 176-179

    Towards a Stronger Location Integrity

previous Page of 2