<p>Introduction: Bringing Protocols to Life (Transcript of Discussion)
Secure Internet Voting Protocol for Overseas Military Voters
Secure Internet Voting Protocol for Overseas Military Voters<p>(Transcript of Discussion)
Self-enforcing Electronic Voting
Self-enforcing Electronic Voting (Transcript of Discussion)
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
^
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
^
^^
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p></p></p></p>Secure Internet Voting Protocol for Overseas Military Voters
Secure Internet Voting Protocol for Overseas Military Voters<p>(Transcript of Discussion)
Self-enforcing Electronic Voting
Self-enforcing Electronic Voting (Transcript of Discussion)
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
^
^^
Statistical Metrics for Individual Password Strength(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
^
^^
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p></p></p>Self-enforcing Electronic Voting
Self-enforcing Electronic Voting (Transcript of Discussion)
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
^
^^
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
^
^^
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p></p>Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
^
^^
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
^
^^
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p>The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
^
^^
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
^
^^
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Tra.
^^