000 | 06585nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-540-77156-2 | ||
003 | DE-He213 | ||
005 | 20240730190823.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2007 gw | s |||| 0|eng d | ||
020 |
_a9783540771562 _9978-3-540-77156-2 |
||
024 | 7 |
_a10.1007/978-3-540-77156-2 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aSecurity Protocols _h[electronic resource] : _b13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers / _cedited by Bruce Christianson, Bruno Crispo, James A. Malcom, Michael Roe. |
250 | _a1st ed. 2007. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2007. |
|
300 |
_aIX, 350 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v4631 |
|
505 | 0 | _aThe System Likes You -- Experiences with Host-to-Host IPsec -- Experiences with Host-to-Host IPsec -- Repairing the Bluetooth Pairing Protocol -- Repairing the Bluetooth Pairing Protocol -- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags -- Keep on Blockin' in the Free World -- PIN (and Chip) or Signature: Beating the Cheating? -- PIN (and Chip) or Signature: Beating the Cheating? -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Multi-channel Protocols -- Multi-channel Protocols -- Combining Crypto with Biometrics: A New Human-Security Interface -- User-Friendly Grid Security Architecture and Protocols -- User-Friendly Grid Security Architecture and Protocols -- Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits with System Security CAPTCHAS -- The System Likes You? -- Enhancing Privacy with Shared Pseudo Random Sequences -- Enhancing Privacy with Shared Pseudo Random Sequences -- Non-repudiation and the Metaphysics of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols Are User-Unfriendly -- Understanding Why Some Network Protocols Are User-Unfriendly -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Listen Too Closely and You May Be Confused -- Listen Too Closely and You May Be Confused -- The Dining Freemasons (Security Protocols for Secret Societies).-The Dining Freemasons (Security Protocols for Secret Societies) -- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) -- Safer Scripting Through Precompilation -- Safer Scripting Through Precompilation -- Implementing a Multi-hat PDA -- Implementing a Multi-hat PDA -- Anonymous Context Based Role Activation Mechanism -- Anonymous Context Based Role Activation Mechanism -- Topology of Covert Conflict -- The Initial Costs and Maintenance Costs of Protocols -- The Initial Costs and Maintenance Costs of Protocols -- Alice and Bob. | |
520 | _aWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was "The systemlikes youandwants to be yourfriend." Security is usually seen as making systems more di?cult for humans to use. Might there be advantages to looking at security in the context of more general design problems? Perhaps those investigating the general properties of system design and those of us in the security community have more to say to each other than we thought. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, and to the University of Hertfordshire for lending us several of their sta?. Particular thanks to Johanna Hunt of the University of Hertfordshire for being our impresario and organizing everything, and to Lori Klimaszewska of the University of CambridgeComputing Service for transcribing the audio tapes (in which the "crash barriers" nearly prevented collisions). The Security Protocols Workshop exists because you, the audience, part- ipate. Once you have dived into these proceedings and have had some Eleatic thoughts, we expect to hear from you. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9144027 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9144028 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aChristianson, Bruce. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9144029 |
|
700 | 1 |
_aCrispo, Bruno. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9144030 |
|
700 | 1 |
_aMalcom, James A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9144031 |
|
700 | 1 |
_aRoe, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9144032 |
|
710 | 2 |
_aSpringerLink (Online service) _9144033 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540771555 |
776 | 0 | 8 |
_iPrinted edition: _z9783540846550 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v4631 _9144034 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-540-77156-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93465 _d93465 |