000 03462cam a2200289 a 4500
008 100309s2009 gw a b 101 0 eng
010 _a2009935708
020 _a9783642049033 (softcover : alk. paper)
020 _a3642049036 (softcover : alk. paper)
035 _a(Sirsi) u4604
040 _aEG-CaNU
_c EG-CaNU
_d EG-CaNU
042 _ancode
082 0 0 _a 005.8
_2 22
111 2 _aInternational Workshop on Security Protocols
_n (14th :
_d 2006 :
_c Cambridge, England)
_9232
245 0 0 _aSecurity protocols :
_b 14th international workshop, Cambridge, March 27-29 2006, revised selected papers /
_c volume editors, Bruce Christianson ... [et al.].
260 _aBerlin :
_b Springer,
_c 2009.
300 _aix, 285 p. :
_b ill. ;
_c 24 cm.
490 0 _aLecture notes in computer science,
_x 0302-9743 ;
_v 5087
500 _aSelected conference papers.
504 _aIncludes bibliographical references and index.
505 0 _aPutting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Towards a Secure ApplicationSemantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- The ManintheMiddle Defence -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure HumanMachine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot Cyborg and Automated Turing Test -- Bot Cyborg and Automated Turing Test -- A 2Round Anonymous Veto Protocol -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming The Obol Protocol Language -- Cordial Security Protocol Programming -- PrivacySensitive Congestion Charging -- PrivacySensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The ManintheMiddle Defence -- A 2Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Defining the Permissions of Guests -- Defining the Permissions of Guests -- The Last Word -- Author Index.
520 _aThis book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
650 0 _aComputer security
_v Congresses.
_99195
650 0 _aCryptography
_v Congresses.
_99196
700 1 _aChristianon , Bruce
_99197
596 _a1
999 _c3610
_d3610