MARC details
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100309s2009 gw a b 101 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2009935708 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783642049033 (softcover : alk. paper) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
3642049036 (softcover : alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(Sirsi) u4604 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EG-CaNU |
| Transcribing agency |
EG-CaNU |
| Modifying agency |
EG-CaNU |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 111 2# - MAIN ENTRY--MEETING NAME |
| Meeting name or jurisdiction name as entry element |
International Workshop on Security Protocols |
| Number of part/section/meeting |
(14th : |
| Date of meeting or treaty signing |
2006 : |
| Location of meeting |
Cambridge, England) |
| 9 (RLIN) |
232 |
| 245 00 - TITLE STATEMENT |
| Title |
Security protocols : |
| Remainder of title |
14th international workshop, Cambridge, March 27-29 2006, revised selected papers / |
| Statement of responsibility, etc. |
volume editors, Bruce Christianson ... [et al.]. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Berlin : |
| Name of publisher, distributor, etc. |
Springer, |
| Date of publication, distribution, etc. |
2009. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
ix, 285 p. : |
| Other physical details |
ill. ; |
| Dimensions |
24 cm. |
| 490 0# - SERIES STATEMENT |
| Series statement |
Lecture notes in computer science, |
| International Standard Serial Number |
0302-9743 ; |
| Volume/sequential designation |
5087 |
| 500 ## - GENERAL NOTE |
| General note |
Selected conference papers. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- The ManintheMiddle Defence -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot Cyborg and Automated Turing Test -- Bot Cyborg and Automated Turing Test -- A 2Round Anonymous Veto Protocol -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming The Obol Protocol Language -- Cordial Security Protocol Programming -- PrivacySensitive Congestion Charging -- PrivacySensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The ManintheMiddle Defence -- A 2Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Defining the Permissions of Guests -- Defining the Permissions of Guests -- The Last Word -- Author Index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others. |
| 596 ## - |
| -- |
1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
9195 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Cryptography |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
9196 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Christianon , Bruce |
| 9 (RLIN) |
9197 |