|
Accepted Papers
|
- Title: Panel on the future of Biologically-inspired Security: Is there
anything left to learn?
Authors: Jan Feyereisl, Anil Somayaji and Michael Locasto
- Title: Authenticated Names
Authors: Stanley Chow, Christophe Gustav and Dmitri Vinokurov
- Title: Computing Under Occupation
Authors: Klaus Kursawe and Stefan Katzenbeisser
- Title: Information Protection via Environmental Data Tethers
Authors: Matt Beaumont-Gay, Kevin Eustice and Peter Reiher
- Title: Position: The User is the Enemy
Authors: Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran and
Shambhu Upadhyaya
- Title: Privacy Expectations/Security Assurance Offer System
Authors: Jeffrey Hunker
- Title: Robustly Secure Computer Systems: A new security paradigm of
system discontinuity
Authors: Jon Solworth
- Title: Security and Usability: The Gap in Real-World Online Banking
Authors: Mohammad Mannan and Paul C. van Oorschot
- Title: Security Automation Considered Harmful?
Authors: W. Keith Edwards, Erika Shehan and Jennifer Stoll
- Title: Self-Healing: Science, Engineering, and Fiction
Authors: Michael Locasto
- Title: VideoTicket: Detecting Identity Fraud Attempts via Audiovisual
Certificates and Signatures
Authors: Deholo Nali, Paul van Oorschot and Andy Adler
|
|