Security protocols : (Record no. 3610)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100309s2009 gw a b 101 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009935708
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642049033 (softcover : alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3642049036 (softcover : alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u4604
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element International Workshop on Security Protocols
Number of part/section/meeting (14th :
Date of meeting or treaty signing 2006 :
Location of meeting Cambridge, England)
9 (RLIN) 232
245 00 - TITLE STATEMENT
Title Security protocols :
Remainder of title 14th international workshop, Cambridge, March 27-29 2006, revised selected papers /
Statement of responsibility, etc. volume editors, Bruce Christianson ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Berlin :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. 2009.
300 ## - PHYSICAL DESCRIPTION
Extent ix, 285 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Lecture notes in computer science,
International Standard Serial Number 0302-9743 ;
Volume/sequential designation 5087
500 ## - GENERAL NOTE
General note Selected conference papers.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- The ManintheMiddle Defence -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot Cyborg and Automated Turing Test -- Bot Cyborg and Automated Turing Test -- A 2Round Anonymous Veto Protocol -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming The Obol Protocol Language -- Cordial Security Protocol Programming -- PrivacySensitive Congestion Charging -- PrivacySensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The ManintheMiddle Defence -- A 2Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Defining the Permissions of Guests -- Defining the Permissions of Guests -- The Last Word -- Author Index.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Form subdivision Congresses.
9 (RLIN) 9195
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography
Form subdivision Congresses.
9 (RLIN) 9196
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Christianon , Bruce
9 (RLIN) 9197
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / CH.S 2009 006628 11/24/2019 1 11/24/2019 Books