Introduction: Bringing Protocols to Life (Transcript of Discussion).- Secure Internet Voting Protocol for Overseas Military Voters.- Secure Internet Voting Protocol for Overseas Military Voters(Transcript of Discussion).- Self-enforcing Electronic Voting.- Self-enforcing Electronic Voting (Transcript of Discussion).- Approaches to Modelling Security Scenarios with Domain-SpecificLanguages.- Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion).- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail.- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Secure Internet Voting Protocol for Overseas Military Voters.- Secure Internet Voting Protocol for Overseas Military Voters(Transcript of Discussion).- Self-enforcing Electronic Voting.- Self-enforcing Electronic Voting (Transcript of Discussion).- Approaches to Modelling Security Scenarios with Domain-SpecificLanguages.- Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion).- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail.- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Self-enforcing Electronic Voting.- Self-enforcing Electronic Voting (Transcript of Discussion).- Approaches to Modelling Security Scenarios with Domain-SpecificLanguages.- Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion).- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail.- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion).- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail.- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail.- The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob?(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of InformationFlow.- Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System.- Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices (Transcript of Discussion).- Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Stayin' Alive: Aliveness as an Alternative to Authentication.- Stayin' Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word. Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word.