Security Design in Human Computation Games (English)
- New search for: Yu, S.-Y.
- New search for: Yan, J.
- New search for: Yu, S.-Y.
- New search for: Yan, J.
- New search for: Christianson, Bruce
- New search for: Malcolm, James A.
In:
Security protocols
7061
;
142-153
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Security Design in Human Computation Games
-
Contributors:
-
Conference:International workshop; 18th, Security protocols ; 2010 ; Cambridge
-
Published in:Security protocols , 7061 ; 142-153LECTURE NOTES IN COMPUTER SCIENCE , 7061 ; 142-153
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2014-01-01
-
Size:12 pages
-
Remarks:Based on those presented at the workshop. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Introduction: Virtually Perfect Security (Transcript of Discussion)Christianson, B. et al. | 2014
- 3
-
Caught in the Maze of Security StandardsMeier, J. / Gollmann, D. et al. | 2014
- 4
-
Caught in the Maze of Security Standards (Transcript of Discussion)Gollmann, D. et al. | 2014
- 12
-
Blood in the Water: Are There Honeymoon Effects Outside Software?Clark, S. / Blaze, M. / Smith, J. et al. | 2014
- 18
-
Blood in the Water (Transcript of Discussion)Clark, S. et al. | 2014
- 25
-
Digital Immolation: New Directions for Online ProtestBonneau, J. et al. | 2014
- 34
-
Digital Immolation (Transcript of Discussion)Bonneau, J. et al. | 2014
- 45
-
Relay-Proof Channels Using UWB LasersChristianson, B. / Shafarenko, A. / Stajano, F. / Wong, F.L. et al. | 2014
- 47
-
Relay-Proof Channels Using UWB Lasers (Transcript of Discussion)Shafarenko, A. et al. | 2014
- 54
-
Using Dust Clouds to Enhance Anonymous CommunicationMortier, R. / Madhavapeddy, A. / Hong, T. / Murray, D. / Schwarzkopf, M. et al. | 2014
- 60
-
Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion)Schwarzkopf, M. et al. | 2014
- 71
-
Generating Channel Ids in Virtual World Operating Systems (Extended Abstract)Roe, M. et al. | 2014
- 74
-
Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion)Danezis, G. et al. | 2014
- 82
-
Censorship-Resilient Communications through Information ScatteringOrtolani, S. / Conti, M. / Crispo, B. et al. | 2014
- 90
-
Censorship-Resilient Communications through Information Scattering (Transcript of Discussion)Conti, M. et al. | 2014
- 98
-
On Storing Private Keys in the CloudAnderson, J. / Stajano, F. et al. | 2014
- 107
-
On Storing Private Keys in the Cloud (Transcript of Discussion)Anderson, J. et al. | 2014
- 115
-
More Security or Less InsecurityChowdhury, P.D. / Christianson, B. et al. | 2014
- 120
-
More Security or Less Insecurity (Transcript of Discussion)Christianson, B. et al. | 2014
- 127
-
It's the Anthropology, Stupid!Anderson, R. / Stajano, F. et al. | 2014
- 131
-
It's the Anthropology, Stupid! (Transcript of Discussion)Anderson, R. et al. | 2014
- 142
-
Security Design in Human Computation GamesYu, S.-Y. / Yan, J. et al. | 2014
- 154
-
Security Design in Human Computation Games (Transcript of Discussion)Yan, J. et al. | 2014
- 161
-
Virtually Perfect DemocracyBella, G. / Ryan, P.Y.A. / Teague, V. et al. | 2014
- 167
-
Virtually Perfect Democracy (Transcript of Discussion)Ryan, P.Y.A. et al. | 2014
- 175
-
Security Protocols for Secret SantaMauw, S. / Radomirovic, S. / Ryan, P.Y.A. et al. | 2014
- 185
-
Security Protocols for Secret Santa (Transcript of Discussion)Mauw, S. et al. | 2014
- 191
-
Censorship of eBooks (Extended Abstract)Roe, M. et al. | 2014
- 200
-
Censorship of eBooks (Transcript of Discussion)Roe, M. et al. | 2014
- 207
-
On the Value of Hybrid Security TestingAloteibi, S. / Stajano, F. et al. | 2014
- 214
-
On the Value of Hybrid Security Testing (Transcript of Discussion)Aloteibi, S. et al. | 2014
- 217
-
Security Made, Not Perfect, But AutomaticVerissimo, P. et al. | 2014
- 224
-
Security Made, Not Perfect, But Automatic (Transcript of Discussion)Verissimo, P. et al. | 2014
- 233
-
Security Limitations of Virtualization and How to Overcome ThemGligor, V. et al. | 2014
- 252
-
Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion)Gligor, V. et al. | 2014
- 266
-
RecapitulationChristianson, B. et al. | 2014