Papers
Sean Peisert, Ed Talbot and Tom Kroeger. Laws of Authentication: These Aren't The Passwords You're Looking For
Markus Dürmuth. Useful Password Hashing: How to Waste Computing Cycles with Style
Julie Boxwell Ard, Matt Bishop, Carrie Gates and Michael Xin Sun. Information Behaving Badly
Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole
Tippenhauer, An Hoa Vu and David K.Y. Yau. Go with the Flow: Toward Workflow-Oriented Security Assessment
Debi Ashenden and Darren Lawrence. Can We Sell Security Like Soap? A New Approach to Behaviour Change
Jeff Rowe, Karl Levitt and Mike Hogarth. Towards the Realization of a Public Health System for Shared Secure Cyber-Space
Stephen Crane, Per Larsen, Stefan Brunthaler and Michael Franz. Booby Trapping Software
Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates and Steven Greenspan. Forgive and Forget: Return to Obscurity
Suhas Mathur, Baris Coskun and Suhrid Balakrishnan. Detecting Hidden Enemy Lines in IP Address Space
Lianying Zhao and Mohammad Mannan. Explicit Authentication Response Considered Harmful
Anil Somayaji, David Mould and Carson Brown. Towards Narrative Authentication
NSPHD
Daniel M. N. de Castro. The Polyglot Computer
Sathya Chandran Sundaramurthy. Designing Forensic Analysis Techniques through Anthropology
Panel
Serge Egelman, Cormac Herley and Paul C. van Oorschot. Markets for Zero-Day Exploits---Ethics and Implications