Limit search to available items
Book Cover
E-book
Author International Workshop on Security Protocols (13th : 2005 : Cambridge, England)

Title Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers / Bruce Christianson [and others] (eds.)
Published Berlin ; New York : Springer, ©2007

Copies

Description 1 online resource (ix, 345 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 4631
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 4631. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents The System Likes You -- Experiences with Host-to-Host IPsec -- Experiences with Host-to-Host IPsec -- Repairing the Bluetooth Pairing Protocol -- Repairing the Bluetooth Pairing Protocol -- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags -- Keep on Blockin' in the Free World -- PIN (and Chip) or Signature: Beating the Cheating? -- PIN (and Chip) or Signature: Beating the Cheating? -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Multi-channel Protocols -- Multi-channel Protocols -- Combining Crypto with Biometrics: A New Human-Security Interface -- User-Friendly Grid Security Architecture and Protocols -- User-Friendly Grid Security Architecture and Protocols -- Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits with System Security CAPTCHAS -- The System Likes You? -- Enhancing Privacy with Shared Pseudo Random Sequences -- Enhancing Privacy with Shared Pseudo Random Sequences -- Non-repudiation and the Metaphysics of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols Are User-Unfriendly -- Understanding Why Some Network Protocols Are User-Unfriendly -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Listen Too Closely and You May Be Confused -- Listen Too Closely and You May Be Confused -- The Dining Freemasons (Security Protocols for Secret Societies) -- The Dining Freemasons (Security Protocols for Secret Societies) -- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) -- Safer Scripting Through Precompilation -- Safer Scripting Through Precompilation -- Implementing a Multi-hat PDA -- Implementing a Multi-hat PDA -- Anonymous Context Based Role Activation Mechanism -- Anonymous Context Based Role Activation Mechanism -- Topology of Covert Conflict -- The Initial Costs and Maintenance Costs of Protocols -- The Initial Costs and Maintenance Costs of Protocols -- Alice and Bob
Summary This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others
Analysis algoritmen
algorithms
computeranalyse
computer analysis
computers
samenleving
society
informatiesystemen
information systems
computerwetenschappen
computer sciences
computernetwerken
computer networks
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security -- Congresses
Computers -- Access control -- Congresses
Cryptography -- Congresses
Computers -- Access control.
Cryptography.
Computer security.
Informatique.
Computer security
Computers -- Access control
Cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Christianson, Bruce
ISBN 9783540771562
3540771565
9783540771555
3540771557