Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers /
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed t...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Conference Proceeding Book |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2007
|
Series: | LNCS sublibrary Security and cryptology.
Lecture notes in computer science ; 4631 |
Subjects: |
LEADER | 08709nam a2201069Ia 4500 | ||
---|---|---|---|
001 | 84cf4611-662c-4134-80dc-3cc872da6e84 | ||
005 | 20230802000000.0 | ||
008 | 080128s2007 gw a ob 101 0 eng d | ||
015 | |a 07, N49,0054 |2 dnb | ||
015 | |a 08, A10,0049 |2 dnb | ||
016 | 7 | |a 986339008 |2 DE-101 | |
019 | |a 184845379 |a 261068142 |a 288261025 |a 613659048 |a 739139194 |a 756544639 |a 880102411 | ||
020 | |a 3540771557 |q (pbk.) | ||
020 | |a 3540771565 | ||
020 | |a 9783540771555 |q (pbk.) | ||
020 | |a 9783540771562 | ||
024 | 7 | |a 10.1007/978-3-540-77156-2 |2 doi | |
028 | 5 | 2 | |a 12201679 |
035 | |a (OCoLC)191471862 |z (OCoLC)184845379 |z (OCoLC)261068142 |z (OCoLC)288261025 |z (OCoLC)613659048 |z (OCoLC)739139194 |z (OCoLC)756544639 |z (OCoLC)880102411 |z (OCoLC)1012058163 |z (OCoLC)1044618650 |z (OCoLC)1056345142 |z (OCoLC)1060846742 |z (OCoLC)1075335360 |z (OCoLC)1087429891 |z (OCoLC)1091727403 |z (OCoLC)1105588687 |z (OCoLC)1105592948 |z (OCoLC)1112539796 |z (OCoLC)1125533177 |z (OCoLC)1132299942 |z (OCoLC)1136464090 |z (OCoLC)1170100309 |z (OCoLC)1170821696 |z (OCoLC)1204009913 |z (OCoLC)1238395050 | ||
035 | |a (OCoLC)191471862 |z (OCoLC)184845379 |z (OCoLC)261068142 |z (OCoLC)288261025 |z (OCoLC)613659048 |z (OCoLC)739139194 |z (OCoLC)756544639 |z (OCoLC)880102411 | ||
037 | |a 978-3-540-77155-5 |b Springer |n http://www.springerlink.com | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d COD |d STF |d YNG |d NUI |d EBLCP |d OCLCQ |d MND |d OCLCO |d OCLCQ |d OCLCF |d BEDGE |d VT2 |d OCLCQ |d SLY |d OCLCO |d COO |d YDXCP |d IDEBK |d OCL |d OCLCO |d OCLCQ |d OCLCO |d DEBSZ |d OCLCQ |d SHS |d OCLCA |d OCLCQ |d UAB |d ESU |d OCLCQ |d NJR |d U3W |d OCLCA |d BUF |d OCLCQ |d CEF |d TFW |d WYU |d ICG |d YOU |d W2U |d UX1 |d OCLCQ |d OL$ |d OCLCQ |d AUD |d ERF |d WURST |d OCLCQ |d SFB |d OCLCQ |d DCT |d EUX |d OCLCQ |d UKAHL |d OCLCO |d COM |d OCLCO |d OCLCQ |d CSt | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d COD |d STF |d YNG |d NUI |d EBLCP |d OCLCQ |d MND |d OCLCO |d OCLCQ |d OCLCF |d BEDGE |d VT2 |d OCLCQ |d SLY |d OCLCO |d COO |d YDXCP |d IDEBK |d OCL |d OCLCO |d OCLCQ |d OCLCO |d DEBSZ |d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25 |b I574 2005eb | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a QA |2 lcco | |
072 | 7 | |a URY |2 bicssc | |
082 | 0 | 4 | |a 005.8 |2 22 |
084 | |a DAT 252f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a SS 4800 |2 rvk | ||
084 | |a TP309-532 |2 clc | ||
111 | 2 | |a International Workshop on Security Protocols |n (13th : |d 2005 : |c Cambridge, England) | |
111 | 2 | |a International Workshop on Security Protocols |n (13th : |d 2005 : |c Cambridge, England) | |
245 | 1 | 0 | |a Security protocols : |b 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers / |c Bruce Christianson [and others] (eds.) |
260 | |a Berlin ; |a New York : |b Springer, |c ©2007 | ||
300 | |a 1 online resource (ix, 345 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
347 | |b PDF | ||
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 4631 | |
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a The System Likes You -- Experiences with Host-to-Host IPsec -- Experiences with Host-to-Host IPsec -- Repairing the Bluetooth Pairing Protocol -- Repairing the Bluetooth Pairing Protocol -- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags -- Keep on Blockin' in the Free World -- PIN (and Chip) or Signature: Beating the Cheating? -- PIN (and Chip) or Signature: Beating the Cheating? -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Multi-channel Protocols -- Multi-channel Protocols -- Combining Crypto with Biometrics: A New Human-Security Interface -- User-Friendly Grid Security Architecture and Protocols -- User-Friendly Grid Security Architecture and Protocols -- Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits with System Security CAPTCHAS -- The System Likes You? -- Enhancing Privacy with Shared Pseudo Random Sequences -- Enhancing Privacy with Shared Pseudo Random Sequences -- Non-repudiation and the Metaphysics of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols Are User-Unfriendly -- Understanding Why Some Network Protocols Are User-Unfriendly -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Listen Too Closely and You May Be Confused -- Listen Too Closely and You May Be Confused -- The Dining Freemasons (Security Protocols for Secret Societies) -- The Dining Freemasons (Security Protocols for Secret Societies) -- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) -- Safer Scripting Through Precompilation -- Safer Scripting Through Precompilation -- Implementing a Multi-hat PDA -- Implementing a Multi-hat PDA -- Anonymous Context Based Role Activation Mechanism -- Anonymous Context Based Role Activation Mechanism -- Topology of Covert Conflict -- The Initial Costs and Maintenance Costs of Protocols -- The Initial Costs and Maintenance Costs of Protocols -- Alice and Bob | |
520 | |a This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others | ||
588 | 0 | |a Print version record | |
596 | |a 22 | ||
650 | 0 | |a Computer security |v Congresses | |
650 | 0 | |a Computers |x Access control |v Congresses | |
650 | 0 | |a Cryptography |v Congresses | |
650 | 4 | |a Computer science | |
650 | 6 | |a Cryptographie |v Congrès | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle |v Congrès | |
650 | 6 | |a Sécurité informatique |v Congrès | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |2 fast | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Informatique |2 eclas | |
650 | 0 | 7 | |a Computer security |2 cct |
650 | 0 | 7 | |a Computers |x Access control |2 cct |
650 | 0 | 7 | |a Cryptography |2 cct |
653 | 0 | 0 | |a algorithms |
653 | 0 | 0 | |a algoritmen |
653 | 0 | 0 | |a computer analysis |
653 | 0 | 0 | |a computer networks |
653 | 0 | 0 | |a computer sciences |
653 | 0 | 0 | |a computeranalyse |
653 | 0 | 0 | |a computernetwerken |
653 | 0 | 0 | |a computers |
653 | 0 | 0 | |a computerwetenschappen |
653 | 0 | 0 | |a data management |
653 | 0 | 0 | |a gegevensbeheer |
653 | 0 | 0 | |a informatiesystemen |
653 | 0 | 0 | |a information systems |
653 | 0 | 0 | |a samenleving |
653 | 0 | 0 | |a society |
653 | 1 | 0 | |a Informatie- en communicatietechnologie (algemeen) |
653 | 1 | 0 | |a Information and Communication Technology (General) |
655 | 4 | |a Electronic books | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Christianson, Bruce |1 http://viaf.org/viaf/18011908 | |
700 | 1 | |a Christianson, Bruce | |
776 | 0 | 8 | |i Print version: |a International Workshop on Security Protocols (13th : 2005 : Cambridge, England) |t Security protocols. |d Berlin ; New York : Springer, ©2007 |z 9783540771555 |z 3540771557 |w (DLC) 2007940529 |w (OCoLC)183257726 |
776 | 0 | 8 | |i Print version: |a International Workshop on Security Protocols (13th : 2005 : Cambridge, England) |t Security protocols. |d Berlin ; New York : Springer, ©2007 |z 9783540771555 |z 3540771557 |w (DLC) 2007940529 |w (OCoLC)183257726 |
830 | 0 | |a LNCS sublibrary |n SL 4, |p Security and cryptology. | |
830 | 0 | |a Lecture notes in computer science ; |v 4631 |x 0302-9743 | |
999 | 1 | 0 | |i 84cf4611-662c-4134-80dc-3cc872da6e84 |l a13362177 |s US-CST |m security_protocols13th_international_workshop_cambridge_uk_april_20_22_____2007_______sprina________________________________________international_worksh_______________e |
999 | 1 | 0 | |i 84cf4611-662c-4134-80dc-3cc872da6e84 |l 11066797 |s US-ICU |m security_protocols13th_international_workshop_cambridge_uk_april_20_22_____2007_______sprina________________________________________international_worksh_______________e |
999 | 1 | 1 | |l a13362177 |s ISIL:US-CST |t BKS |a SUL INTERNET |b 13362177-1001 |c INTERNET RESOURCE |d ASIS |x SUL |y 13362177-1001 |p UNLOANABLE |