You are here

NSPW 2013 Proceedings

Forgive and forget: return to obscurity
Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan

Towards the realization of a public health system for shared secure cyber-space
Jeff Rowe, Karl Levitt, Mike Hogarth

Detecting hidden enemy lines in IP address space
Suhas Mathur, Baris Coskun, Suhrid Balakrishnan

Useful password hashing: how to waste computing cycles with style
Markus Dürmuth

Markets for zero-day exploits: ethics and implications
Serge Egelman, Cormac Herley, Paul C. van Oorschot

Principles of authentication
Sean Peisert, Ed Talbot, Tom Kroeger

Towards narrative authentication: or, against boring authentication
Anil Somayaji, David Mould, Carson Brown

Go with the flow: toward workflow-oriented security assessment
Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K.Y. Yau

Explicit authentication response considered harmful
Lianying Zhao, Mohammad Mannan

Can we sell security like soap?: a new approach to behaviour change
Debi Ashenden, Darren Lawrence

Booby trapping software
Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz

Information behaving badly
Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun

Designing forensic analysis techniques through anthropology
Sathya Chandran Sundaramurthy

The polyglot computer
Daniel Medeiros Nunes de Castro