000 | 04881nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-662-45921-8 | ||
003 | DE-He213 | ||
005 | 20240730185035.0 | ||
007 | cr nn 008mamaa | ||
008 | 141201s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662459218 _9978-3-662-45921-8 |
||
024 | 7 |
_a10.1007/978-3-662-45921-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity Protocols XVIII _h[electronic resource] : _b18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers / _cedited by Bruce Christianson, James Malcolm. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 267 p. 19 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7061 |
|
505 | 0 | _aIntroduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It's the Anthropology, Stupid! -- It's the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations ofVirtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation. | |
520 | _aThis book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security". | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9137671 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9137672 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aChristianson, Bruce. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137673 |
|
700 | 1 |
_aMalcolm, James. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9137674 |
|
710 | 2 |
_aSpringerLink (Online service) _9137675 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783662459201 |
776 | 0 | 8 |
_iPrinted edition: _z9783662459225 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7061 _9137676 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-662-45921-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92614 _d92614 |