Security protocols : 14th international workshop, Cambridge, March 27-29 2006, revised selected papers / volume editors, Bruce Christianson ... [et al.].
Material type:
TextSeries: Lecture notes in computer science ; 5087Publication details: Berlin : Springer, 2009.Description: ix, 285 p. : ill. ; 24 cmISBN: - 9783642049033 (softcover : alk. paper)
- 3642049036 (softcover : alk. paper)
- 005.8 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.8 / CH.S 2009 (Browse shelf(Opens below)) | 1 | Available | 006628 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 / BO.S 2010 Security of mobile communications / | 005.8 / BU.S 2008 Security and cooperation in wireless networks : | 005.8 / CA.M 2010 The management of network security : | 005.8 / CH.S 2009 Security protocols : | 005.8 / CI.S 2008 Security+ guide to network security fundamentals / | 005.8 / CI.S 2012 Security+ guide to network security fundamentals / | 005.8 / CO.S 2010 Surreptitious software : |
Selected conference papers.
Includes bibliographical references and index.
Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- The ManintheMiddle Defence -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot Cyborg and Automated Turing Test -- Bot Cyborg and Automated Turing Test -- A 2Round Anonymous Veto Protocol -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming The Obol Protocol Language -- Cordial Security Protocol Programming -- PrivacySensitive Congestion Charging -- PrivacySensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The ManintheMiddle Defence -- A 2Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Defining the Permissions of Guests -- Defining the Permissions of Guests -- The Last Word -- Author Index.
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
1
There are no comments on this title.