NSPW 2013 Proceedings

Front Matter

Forgive and forget: return to obscurity (DOI)
Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan

Towards the realization of a public health system for shared secure cyber-space (DOI)
Jeff Rowe, Karl Levitt, Mike Hogarth

Detecting hidden enemy lines in IP address space (DOI)
Suhas Mathur, Baris Coskun, Suhrid Balakrishnan

Useful password hashing: how to waste computing cycles with style (DOI)
Markus Dürmuth

Markets for zero-day exploits: ethics and implications (DOI)
Serge Egelman, Cormac Herley, Paul C. van Oorschot

Principles of authentication (DOI)
Sean Peisert, Ed Talbot, Tom Kroeger

Towards narrative authentication: or, against boring authentication (DOI)
Anil Somayaji, David Mould, Carson Brown

Go with the flow: toward workflow-oriented security assessment (DOI)
Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K.Y. Yau

Explicit authentication response considered harmful (DOI)
Lianying Zhao, Mohammad Mannan

Can we sell security like soap?: a new approach to behaviour change (DOI)
Debi Ashenden, Darren Lawrence

Booby trapping software (DOI)
Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz

Information behaving badly (DOI)
Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun

Designing forensic analysis techniques through anthropology (DOI)
Sathya Chandran Sundaramurthy

NSPHD: the polyglot computer (DOI)
Daniel Medeiros Nunes de Castro