Normal view MARC view ISBD view

Security Protocols XXVIII [electronic resource] : 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers / edited by Frank Stajano, Vashek Matyáš, Bruce Christianson, Jonathan Anderson.

Contributor(s): Stajano, Frank [editor.] | Matyáš, Vashek [editor.] | Christianson, Bruce [editor.] | Anderson, Jonathan [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 14186Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2023Edition: 1st ed. 2023.Description: XI, 271 p. 25 illus., 18 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031430336.Subject(s): Data protection | Computer networks  | Computers and civilization | Application software | Software engineering | User interfaces (Computer systems) | Human-computer interaction | Data and Information Security | Computer Communication Networks | Computers and Society | Computer and Information Systems Applications | Software Engineering | User Interfaces and Human Computer InteractionAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Sleepwalking into Disaster? Requirements Engineering for Digital Cash -- Transporting a Secret Using Destructively-Read Memory -- Authentication of IT Professionals in the Wild - A Survey -- Incentives and Censorship Resistance for Mixnets Revisited -- Can't Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices -- Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches -- Trusted Introductions for Secure Messaging -- Choosing Your Friends: Shaping Ethical Use of Anonymity Networks -- One Protocol to Rule them All? On Securing Interoperable Messaging -- If it's Provably Secure, it Probably isn't: Why Learning from Proof Failure is Hard -- Towards Human-Centric Endpoint Security -- Determining an Economic Value of High Assurance for Commodity Software Security -- Blind Auditing and Probabilistic Access Controls.
In: Springer Nature eBookSummary: This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27-28, 2023. Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was "Humans in security protocols - are we learning from mistakes?" The topics covered are securing the human endpoint and proving humans correct.
    average rating: 0.0 (0 votes)
No physical items for this record

Sleepwalking into Disaster? Requirements Engineering for Digital Cash -- Transporting a Secret Using Destructively-Read Memory -- Authentication of IT Professionals in the Wild - A Survey -- Incentives and Censorship Resistance for Mixnets Revisited -- Can't Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices -- Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches -- Trusted Introductions for Secure Messaging -- Choosing Your Friends: Shaping Ethical Use of Anonymity Networks -- One Protocol to Rule them All? On Securing Interoperable Messaging -- If it's Provably Secure, it Probably isn't: Why Learning from Proof Failure is Hard -- Towards Human-Centric Endpoint Security -- Determining an Economic Value of High Assurance for Commodity Software Security -- Blind Auditing and Probabilistic Access Controls.

This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27-28, 2023. Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was "Humans in security protocols - are we learning from mistakes?" The topics covered are securing the human endpoint and proving humans correct.

There are no comments for this item.

Log in to your account to post a comment.