<p>Introduction: Bringing Protocols to Life (Transcript of Discussion).- Secure Internet Voting Protocol for Overseas Military Voters.- Secure Internet Voting Protocol for Overseas Military Voters </p><p>(Transcript of Discussion).- Self-enforcing Electronic Voting.- Self-enforcing Electronic Voting (Transcript of Discussion).- Approaches to Modelling Security Scenarios with Domain-Specific </p><p>Languages.- Approaches to Modelling Security Scenarios with Domain-Specific </p><p>Languages (Transcript of Discussion).- The Casino and the OODA Loop: Why Our Protocols Always </p><p>Eventually Fail.- The Casino and the OODA Loop: Why Our Protocols Always </p><p>Eventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength </p><p>(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication </p><p>(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK </p><p>(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob? </p><p>(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of Information </p><p>Flow.- Usable Privacy by Visual and Interactive Control of Information </p><p>Flow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed Geolocation </p><p>Tracking System.- Sense-And-Trace: A Privacy Preserving Distributed Geolocation </p><p>Tracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocol </p><p>for Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocol </p><p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion).- Stayin’ Alive: Aliveness as an Alternative to Authentication.- Stayin’ Alive: Aliveness as an Alternative to Authentication </p><p>(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word.</p><p>Secure Internet Voting Protocol for Overseas Military Voters.- Secure Internet Voting Protocol for Overseas Military Voters </p><p>(Transcript of Discussion).- Self-enforcing Electronic Voting.- Self-enforcing Electronic Voting (Transcript of Discussion).- Approaches to Modelling Security Scenarios with Domain-Specific </p><p>Languages.- Approaches to Modelling Security Scenarios with Domain-Specific </p><p>Languages (Transcript of Discussion).- The Casino and the OODA Loop: Why Our Protocols Always </p><p>Eventually Fail.- The Casino and the OODA Loop: Why Our Protocols Always </p><p>Eventually Fail (Transcript of Discussion).- Statistical Metrics for Individual Password Strength.- Statistical Metrics for Individual Password Strength(Transcript of Discussion).- Street-Level Trust Semantics for Attribute Authentication.- Street-Level Trust Semantics for Attribute Authentication </p><p>(Transcript of Discussion).- Analysis of Issues and Challenges of E-Voting in the UK.- Analysis of Issues and Challenges of E-Voting in the UK </p><p>(Transcript of Discussion).- Protocol Governance: The Elite, or the Mob?.- Protocol Governance: The Elite, or the Mob? </p><p>(Transcript of Discussion).- Usability Issues in Security.- Usability Issues in Security (Transcript of Discussion).- Usable Privacy by Visual and Interactive Control of Information </p><p>Flow.- Usable Privacy by Visual and Interactive Control of Information </p><p>Flow (Transcript of Discussion).- Sense-And-Trace: A Privacy Preserving Distributed Geolocation </p><p>Tracking System.- Sense-And-Trace: A Privacy Preserving Distributed Geolocation </p><p>Tracking System (Transcript of Discussion).- Am I in Good Company? A Privacy-Protecting Protocol </p><p>for Cooperating Ubiquitous Computing Devices.- Am I in Good Company? A Privacy-Protecting Protocol </p><p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion).- Stayin’ Alive: Aliveness as an Alternative to Authentication.- Stayin’ Alive: Aliveness as an Alternative to Authentication </p><p>(Transcript of Discussion).- Paul Revere Protocols.- Paul Revere Protocols (Transcript of Discussion).- The Last Word</p>