Stop the war!
Остановите войну!
for scientists:
default search action
12. Security Protocols Workshop 2004: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 - Bruce Christianson:
Introduction: Authentic Privacy. 1-3 - Andreas Pashalidis, Chris J. Mitchell:
Limits to Anonymity When Using Credentials. 4-12 - Chris J. Mitchell:
Limits to Anonymity When Using Credentials (Transcript of Discussion). 13-19 - Endre Bangerter, Jan Camenisch, Anna Lysyanskaya:
A Cryptographic Framework for the Controlled Release of Certified Data. 20-42 - Endre Bangerter:
A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion). 43-50 - Frank Stajano:
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. 51-64 - Frank Stajano:
One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). 65-67 - Pasi Eronen, Jari Arkko:
Authentication Components: Engineering Experiences and Guidelines. 68-77 - Pasi Eronen:
Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion). 78-82 - Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac:
Accountable Privacy. 83-95 - Rebecca N. Wright:
Accountable Privacy (Transcript of Discussion). 96-105 - Matt Blaze:
Toward a Broader View of Security Protocols. 106-120 - Matt Blaze:
Toward a Broader View of Security Protocols (Transcript of Discussion). 121-132 - Tuomas Aura, Alf Zugenmaier:
Privacy, Control and Internet Mobility. 133-145 - Tuomas Aura:
Privacy, Control and Internet Mobility (Transcript of Discussion). 146-150 - Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan, Kan Zhang:
Controlling Who Tracks Me. 151-154 - Robert N. Mayo:
Controlling Who Tracks Me (Transcript of Discussion). 155-162 - Jukka Ylitalo, Pekka Nikander:
BLIND: A Complete Identity Protection Framework for End-Points. 163-176 - Jukka Ylitalo:
BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion). 177-178 - Fabio Massacci, Nicola Zannone:
Privacy Is Linking Permission to Purpose. 179-191 - Fabio Massacci:
Privacy is Linking Permission to Purpose (Transcript of Discussion). 192-198 - Laurent Bussard, Refik Molva:
Establishing Trust with Privacy. 199-209 - Laurent Bussard:
Establishing Trust with Privacy (Transcript of Discussion). 210-212 - Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. 213-220 - Bogdan C. Popescu:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion). 221-230 - Ross J. Anderson:
The Dancing Bear: A New Way of Composing Ciphers. 231-238 - Ross J. Anderson:
The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion). 239-245 - Dieter Gollmann:
Identity and Location. 246-250 - Dieter Gollmann:
Identity and Location (Transcript of Discussion). 251-255 - Virgil D. Gligor:
Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). 256-266 - Daniel Cvrcek, Václav Matyás Jr.:
Pseudonymity in the Light of Evidence-Based Trust. 267-274 - Daniel Cvrcek:
Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion). 275 - Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata:
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection. 276-286 - Mikio Hashimoto:
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion). 287-290 - T. Mark A. Lomas:
Why Are We Authenticating (Transcript of Discussion). 291-298 - Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Authentication. 299-305 - Bruce Christianson:
Anonymous Authentication (Transcript of Discussion). 306-311 - Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot:
Towards a Mechanism for Discretionary Overriding of Access Control. 312-319 - Erik Rissanen:
Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion). 320-323 - David Wheeler:
Last Orders. 324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.