Abstract
This article is a curated transcription of the discussion that took place at the workshop when the author presented the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Frank Stajano and Paul Wilson. 2011. Understanding scam victims: seven principles for systems security. Commun. ACM 54, 3 (March 2011), 70–75. DOI:https://doi.org/10.1145/1897852.1897872.
- 2.
Bella G., Coles-Kemp L. (2012) Layered Analysis of Security Ceremonies. In: Gritzalis D., Furnell S., Theoharidou M. (eds) Information Security and Privacy Research. SEC 2012. IFIP Advances in Information and Communication Technology, vol 376. Springer, Berlin, Heidelberg.
- 3.
Anderson R., Stajano F. (2014) Its the Anthropology, Stupid!. In: Christianson B., Malcolm J. (eds) Security Protocols XVIII. Security Protocols 2010. Lecture Notes in Computer Science, vol 7061. Springer, Berlin, Heidelberg.
- 4.
Arsac, W., Bella, G., Chantry, X. et al. J Autom Reasoning (2011) 46: 353. https://doi.org/10.1007/s10817-010-9185-y.
- 5.
Jonathan Herzog. 2005. A computational interpretation of Dolev-Yao adversaries. Theor. Comput. Sci. 340, 1 (June 2005), 57–81. DOI=http://dx.doi.org/10.1016/j.tcs.2005.03.003.
- 6.
Martina, J.E., dos Santos, E., Carlos, M.C. et al. Int. J. Inf. Secur. (2015) 14: 103. https://doi.org/10.1007/s10207-014-0253-x.
- 7.
D. Basin, S. Radomirovic and L. Schmid, “Modeling Human Errors in Security Protocols,” 2016 IEEE 29th Computer Security Foundations Symposium (CSF), Lisbon, 2016, pp. 325–340. https://doi.org/10.1109/CSF.2016.30.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Martina, J.E. (2018). Daemones Non Operantur Nisi Per Artem. In: Matyáš, V., Švenda, P., Stajano, F., Christianson, B., Anderson, J. (eds) Security Protocols XXVI. Security Protocols 2018. Lecture Notes in Computer Science(), vol 11286. Springer, Cham. https://doi.org/10.1007/978-3-030-03251-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-03251-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03250-0
Online ISBN: 978-3-030-03251-7
eBook Packages: Computer ScienceComputer Science (R0)