Limit search to available items
Book Cover
E-book
Author International Workshop on Security Protocols (26th : 2018 : Cambridge, England)

Title Security protocols XXVI : 26th International Workshop, Cambridge, UK, March 19-21, 2018, revised selected papers / Vashek Matyáš, Petr Švenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.)
Published Cham, Switzerland : Springer, 2018

Copies

Description 1 online resource (xi, 305 pages) : illustrations (some color)
Series Lecture notes in computer science ; 11286
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11286.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Raven authentication service : attacks and countermeasures / Graham Rymer and David Llewellyn-Jones ; Raven authentication service attacks and countermeasures (transcript of discussion) / Graham Rymer -- Your code is my code : exploiting a common weakness in OAuth 2.0 implementations / Wanpeng Li, Chris J. Mitchell, and Thomas Chen ; Your code is my code : exploiting a common weakness in OAuth 2.0 implementations (transcript of discussion) / Wanpeng Li -- Non-monotonic security protocols and failures in financial intermediation / Fabio Massacci, Chan Nam Ngo, Daniele Venturi, and Julian Williams ; Non-monotonic security protocols and failures in financial intermediation (transcript of discussion) / Fabio Massacci -- HoneyPAKEs / José Becerra, Peter B. Rønne, Peter Y. A. Ryan, and Petra Sala ; HoneyPAKEs (transcript of discussion) / Peter Y. A. Ryan -- Entropy crowdsourcing : protocols for link key updates in wireless sensor networks / Lukas Nemec, Radim Ostadal, Vashek Matyas, and Petr Švenda ; Entropy crowdsourcing : protocols for link key updates in wireless sensor networks (transcript of discussion) / Lukas Nemec -- Daemones non operantur nisi per artem : daemons do not operate save through trickery : human tailored threat models for formal verification of fail-safe security ceremonies / Taciane Martimiano and Jean Everson Martina ; Daemones non operantur nisi per artem : daemons do not operate save through trickery : human tailored threat models for formal verification of fail-safe security ceremonies (transcript of discussion) / Jean Everson Martina -- Intentionality and agency in security / Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, and Frank Stajano ; Intentionality and agency in security (transcript of discussion) / Kat Krol -- Incentives in security protocols / Sarah Azouvi, Alexander Hicks, and Steven J. Murdoch ; Incentives in security protocols (transcript of discussion) / Steven J. Murdoch --
Too big to fail : what you need to know before attacking a machine learning system / Tudor Dumitraş, Yiǧitcan Kaya, Radu Mǎrginean, and Octavian Suciu ; Too big to fail : what you need to know before attacking a machine learning system (transcript of discussion) / Tudor Dumitraş -- How does match-fixing inform computer game security? / Jeff Yan ; How does match-fixing inform computer game security? (transcript of discussion) / Jeff Yan -- From secure messaging to secure collaboration / Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, and Alastair R. Beresford ; From secure messaging to secure collaboration (transcript of discussion) / Martin Kleppmann -- Requirements for root of trust establishment / Virgil Gligor and Maverick Woo ; Requirements for root of trust establishment (transcript of discussion) / Virgil Gligor -- User authentication for the internet of things / Frank Stajano and Mark Lomas ; User authentication for the internet of things (transcript of discussion) / Mark Lomas -- Why preventing a cryptocurrency exchange heist isn't good enough / Patrick McCorry, Malte Möser, and Syed Taha Ali ; Why preventing a cryptocurrency heist isn't good enough (transcript of discussion) / Patrick McCorry -- Making Bitcoin legal / Ross Anderson, Ilia Shumailov, and Mansoor Ahmed ; Making Bitcoin legal (transcript of discussion) / Ross Anderson -- On the incommensurability of laws and technical mechanisms : or, what cryptography can't do / Joan Feigenbaum and Daniel J. Weitzner ; On the incommensurability of laws and technical mechanisms : or, what cryptography can't do (transcript of discussion) / Daniel J. Weitzner -- Shatter secrets : using secret sharing to cross borders with encrypted devices / Erinn Atwater and Ian Goldberg ; Shatter secrets : using secret sharing to cross borders with encrypted devices (transcript of discussion) / Erinn Atwater and Ian Goldberg
Summary This volume collects the revised proceedings of the 26th International Security Protocols Workshop, held at Trinity College, Cambridge, UK during March 19-21, 2018. The theme of this workshop was "Fail-safe and fail-deadly concepts in protocol design". We all know that security protocols fail. Fortunately, they do not fail all the time, although sometimes their failure is less evident than we would like. In some situations, specific partial protocol failures that are properly observed and recorded can by design lead to responses that will still drive the protocol execution to a successful end. At other times, we deliberately aim for an all-or-nothing mindset: fail-deadly is a concept from nuclear military strategy, suggesting deterrence by an immediate and forceful response to an attack. It is interesting to investigate what differentiates these two design approaches to security protocols, and what they have in common when we consider a family of protocols where both fail-safe and fail-deadly versions are considered. As usual, this theme was not prescriptive. It was not intended to restrict the topic of the papers, but to help provide a particular perspective for the authors and focus of the discussions, for any paper in some way related to security protocols. The authors were strongly encouraged to consider the theme as a springboard, not a fence. Our intention was to stimulate discussion likely to lead to conceptual advances, or to promising new lines of investigation, rather than to consider finished work
Bibliography Includes bibliographical references at chapter ends, author index
Notes Online resource; title from PDF title page (SpringerLink, viewed December 3, 2018)
Subject Computer security -- Congresses
Software Engineering.
Information retrieval.
Network hardware.
Artificial intelligence.
Computer security.
Computers -- Software Development & Engineering -- General.
Computers -- Information Technology.
Computers -- Hardware -- Network Hardware.
Computers -- Intelligence (AI) & Semantics.
Computers -- Security -- General.
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Matyás̆, Vashek, editor.
Švenda, Petr, editor
Stajano, Frank, editor.
Christianson, Bruce, editor.
Anderson, Jonathan (Computer scientist), editor.
ISBN 9783030032517
3030032515
Other Titles Security protocols 26