1
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back...

2
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... (Transcript of Discussion) -- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA...

3
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

10
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike...

11
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

12
Published 2000
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: The Changing Environment -- Composing Security Properties -- Auditing against...

13
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers...

14
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks...

15
Published 1998
Springer Berlin Heidelberg
Table of Contents: ...Secure books: Protecting the distribution of knowledge -- Protocols using anonymous connections...

16
Published 2013
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

17
Published 2011
Springer Berlin Heidelberg
...Security and Cryptology...

18
by Roe, Michael
Published 2013
Springer London
Subjects: ...Security Science and Technology...

19
by Roe, Michael
Published 2016
Springer International Publishing
... means that policies to address problems of safety, the environment and security are inadequate...