000 04881nam a22006375i 4500
001 978-3-662-45921-8
003 DE-He213
005 20240730185035.0
007 cr nn 008mamaa
008 141201s2014 gw | s |||| 0|eng d
020 _a9783662459218
_9978-3-662-45921-8
024 7 _a10.1007/978-3-662-45921-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity Protocols XVIII
_h[electronic resource] :
_b18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers /
_cedited by Bruce Christianson, James Malcolm.
250 _a1st ed. 2014.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXII, 267 p. 19 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v7061
505 0 _aIntroduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It's the Anthropology, Stupid! -- It's the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations ofVirtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation.
520 _aThis book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security".
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aElectronic data processing
_xManagement.
_9137671
650 0 _aAlgorithms.
_93390
650 1 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9137672
650 2 4 _aIT Operations.
_931703
650 2 4 _aAlgorithms.
_93390
700 1 _aChristianson, Bruce.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9137673
700 1 _aMalcolm, James.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9137674
710 2 _aSpringerLink (Online service)
_9137675
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783662459201
776 0 8 _iPrinted edition:
_z9783662459225
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v7061
_9137676
856 4 0 _uhttps://doi.org/10.1007/978-3-662-45921-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92614
_d92614