Skip to main content
  • Conference proceedings
  • © 2020

Security Protocols XXVII

27th International Workshop, Cambridge, UK, April 10–12, 2019, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12287)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2019.

Buy it now

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

    Pages i-ix
  2. Designing for Humans

    1. Front Matter

      Pages 1-1
    2. Audio CAPTCHA with a Few Cocktails: It’s so Noisy I Can’t Hear You

      • Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov
      Pages 20-40
    3. Audio CAPTCHA with a Few Cocktails: It’s So Noisy I Can’t Hear You (Transcript of Discussion)

      • Benjamin Maximilian Reinheimer, Fairooz Islam, Ilia Shumailov
      Pages 41-47
  3. Understanding Humans

    1. Front Matter

      Pages 49-49
    2. Shaping Our Mental Model of Security

      • Saša Radomirović
      Pages 51-59
    3. Social Constructionism in Security Protocols

      • Simon N. Foley, Vivien M. Rooney
      Pages 69-81
  4. Fresh Perspectives

    1. Front Matter

      Pages 89-89
    2. Mismorphism: The Heart of the Weird Machine

      • Prashant Anantharaman, Vijay Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian et al.
      Pages 113-124
  5. Human Limitations in Security

    1. Front Matter

      Pages 133-133
    2. Affordable Security or Big Guy vs Small Guy

      • Daniele Friolo, Fabio Massacci, Chan Nam Ngo, Daniele Venturi
      Pages 135-147
    3. Human-Computability Boundaries

      • Vijay Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali et al.
      Pages 157-166

Other Volumes

  1. Security Protocols XXVII

About this book

The volume LNCS 12287 constitutes the proceedings of the 27th International Workshop on Security Protocols, held in Cambridge, UK, in April 2019.

The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was “Security Protocols for Humans" The topics covered included Designing for Humans and Understanding Humans, Human Limitations in Security, Secure sharing and collaboration and much more.

Editors and Affiliations

  • Memorial University, St. John's, Canada

    Jonathan Anderson

  • Computer Laboratory, University of Cambridge, Cambridge, UK

    Frank Stajano

  • University of Hertfordshire, Hatfield, UK

    Bruce Christianson

  • Masaryk University, Brno, Czech Republic

    Vashek Matyáš

Bibliographic Information

Buy it now

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access