Limit search to available items
Book Cover
E-book
Author International Workshop on Security Protocols (19th : 2011 : Cambridge, England)

Title Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers / Bruce Christianson [and others] (eds.)
Published Berlin ; New York : Springer, ©2011

Copies

Description 1 online resource (ix, 380 pages)
Series Lecture notes in computer science, 0302-9743 ; 7114
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7114.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Introduction: Alice Doesn't Live Here Anymore (Transcript) / Bruce Christianson -- His Late Master's Voice: Barking for Location Privacy / Mike Burmester -- His Late Master's Voice (Transcript of Discussion) / Mike Burmester -- Can We Fix the Security Economics of Federated Authentication? / Ross Anderson -- Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion) / Ross Anderson -- Pico: No More Passwords! / -- Pico: No More Passwords! (Transcript of Discussion) / Frank Stajano -- Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords / Joseph Bonneau -- Getting Web Authentication Right (Transcript of Discussion) / Joseph Bonneau -- When Context Is Better Than Identity: Authentication / Context Using Empirical Channels / Bangdao Chen, Long Hoang Nguyen and Andrew William Roscoe -- When Context Is Better Than Identity (Transcript of Discussion) / Bangdao Chen -- Selective Location Blinding Using Hash Chains / Gabriele Lenzini, Sjouke Mauw and Jun Pang -- Selective Location Blinding Using Hash Chains (Transcript of Discussion) / Sjouke Mauw -- Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces / Alf Zugenmaier -- Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion) / Alf Zugenmaier -- How to Sync with Alice / Feng Hao and Peter Y.A. Ryan -- How to Sync with Alice (Transcript of Discussion) / Feng Hao -- Attack Detection vs. Privacy -- How to Find the Link or How to Hide It? / Jiérí Kůr, Vashek Matyáš, Andriy Stetsko and Petr Švenda -- Attack Detection vs Privacy -- How to Find the Link or How to Hide It (Transcript of Discussion) / Jiérí Kůr and Andriy Stetsko -- The Sense of Security and a Countermeasure for the False Sense / Yuko Murayama, Yasuhiro Fujihara and Dai Nishioka -- The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion) / James Malcolm -- Towards a Theory of Trust in Networks of Humans and Computers / Virgil Gligor and Jeannette M. Wing -- Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion) / Virgil Gligor -- Gearing Up: How to Eat Your Cryptocake and Still Have It / Alex Shafarenko and Bruce Christianson -- Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion) / Alex Shafarenko -- Make Noise and Whisper: A Solution to Relay Attacks / Omar Choudary and Frank Stajano -- Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion) / Omar Choudary -- Scrambling for Lightweight Censorship Resistance / Joseph Bonneau and Rubin Xu -- Scrambling for Lightweight Censorship Resistance (Transcript of Discussion) / Rubin Xu -- The Metaplace Security Model / Michael Roe -- The Metaplace Security Model (Transcript of Discussion) / Michael Roe -- One-Way Cryptography / Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu, et al. -- One-Way Cryptography (Transcript of Discussion) / Matt Blaze -- How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort) / Jonathan Anderson, Frank Stajano and Robert N.M. Watson -- How to Keep Bad Papers Out of Conferences (Transcript of Discussion) / Jonathan Anderson
Summary This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 17 papers with their transcriptions as well as an introduction, i.e. 35 contributions in total. The theme of the workshop was "Alice doesn't live here anymore."
Analysis Computer science
Computer Communication Networks
Data encryption (Computer science)
Computer software
Information Systems
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computers and Society
Bibliography Includes bibliographical references and author index
Notes English
In Springer eBooks
Subject Computer security -- Congresses
Computer networks -- Access control -- Congresses.
Data encryption (Computer science) -- Congresses
Informatique.
Computer networks -- Access control.
Computer security.
Data encryption (Computer science)
Genre/Form Conference papers and proceedings.
Computer software.
Form Electronic book
Author Christianson, Bruce.
ISBN 9783642258671
3642258670