Limit search to available items
Book Cover
E-book
Author International Workshop on Security Protocols (18th : 2010 : Cambridge, England)

Title Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers / Bruce Christianson, James Malcolm (eds.)
Published Berlin : Springer, 2014

Copies

Description 1 online resource (XII, 267 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 7061
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7061, 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Introduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It's the Anthropology, Stupid! -- It's the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation
Summary This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security"
Analysis computerwetenschappen
computer sciences
informatiesystemen
information systems
algoritmen
algorithms
computeranalyse
computer analysis
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer science.
Computer networks.
Data protection.
Data encryption (Computer science)
Computer software.
Electronic Data Processing
Computer Communication Networks
Software
software.
Computer networks
Computer networks -- Security measures
Computer science
Computer security
Computer software
Data encryption (Computer science)
Data protection
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Christianson, Bruce, editor
Malcolm, James (Computer scientist), editor.
ISBN 9783662459218
3662459213
3662459205
9783662459201
Other Titles Security protocols 18