List of Accepted Papers

Sean Peisert, Ed Talbot and Tom Kroeger. Laws of Authentication: These Aren't The Passwords You're Looking For

Markus Dürmuth. Useful Password Hashing: How to Waste Computing Cycles with Style

Julie Boxwell Ard, Matt Bishop, Carrie Gates and Michael Xin Sun. Information Behaving Badly

Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole
Tippenhauer, An Hoa Vu and David K.Y. Yau. Go with the Flow: Toward Workflow-Oriented Security Assessment

Debi Ashenden and Darren Lawrence. Can We Sell Security Like Soap? A New Approach to Behaviour Change

Jeff Rowe, Karl Levitt and Mike Hogarth. Towards the Realization of a Public Health System for Shared Secure Cyber-Space

Stephen Crane, Per Larsen, Stefan Brunthaler and Michael Franz. Booby Trapping Software

Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates and Steven Greenspan. Forgive and Forget: Return to Obscurity

Suhas Mathur, Baris Coskun and Suhrid Balakrishnan. Detecting Hidden Enemy Lines in IP Address Space

Lianying Zhao and Mohammad Mannan. Explicit Authentication Response Considered Harmful

Anil Somayaji, David Mould and Carson Brown. Towards Narrative Authentication

Daniel M. N. de Castro. The Polyglot Computer

Sathya Chandran Sundaramurthy. Designing Forensic Analysis Techniques through Anthropology

Serge Egelman, Cormac Herley and Paul C. van Oorschot. Markets for Zero-Day Exploits---Ethics and Implications