Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers /

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed t...

Full description

Bibliographic Details
Corporate Author: International Workshop on Security Protocols Cambridge, England
Other Authors: Christianson, Bruce
Format: Conference Proceeding Book
Language:English
Published: Berlin ; New York : Springer, ©2007
Series:LNCS sublibrary Security and cryptology.
Lecture notes in computer science ; 4631
Subjects:
LEADER 08709nam a2201069Ia 4500
001 84cf4611-662c-4134-80dc-3cc872da6e84
005 20230802000000.0
008 080128s2007 gw a ob 101 0 eng d
015 |a 07, N49,0054  |2 dnb 
015 |a 08, A10,0049  |2 dnb 
016 7 |a 986339008  |2 DE-101 
019 |a 184845379  |a 261068142  |a 288261025  |a 613659048  |a 739139194  |a 756544639  |a 880102411 
020 |a 3540771557  |q (pbk.) 
020 |a 3540771565 
020 |a 9783540771555  |q (pbk.) 
020 |a 9783540771562 
024 7 |a 10.1007/978-3-540-77156-2  |2 doi 
028 5 2 |a 12201679 
035 |a (OCoLC)191471862  |z (OCoLC)184845379  |z (OCoLC)261068142   |z (OCoLC)288261025  |z (OCoLC)613659048  |z (OCoLC)739139194  |z (OCoLC)756544639   |z (OCoLC)880102411  |z (OCoLC)1012058163  |z (OCoLC)1044618650  |z (OCoLC)1056345142   |z (OCoLC)1060846742  |z (OCoLC)1075335360  |z (OCoLC)1087429891  |z (OCoLC)1091727403   |z (OCoLC)1105588687  |z (OCoLC)1105592948  |z (OCoLC)1112539796  |z (OCoLC)1125533177   |z (OCoLC)1132299942  |z (OCoLC)1136464090  |z (OCoLC)1170100309  |z (OCoLC)1170821696   |z (OCoLC)1204009913  |z (OCoLC)1238395050 
035 |a (OCoLC)191471862  |z (OCoLC)184845379  |z (OCoLC)261068142  |z (OCoLC)288261025  |z (OCoLC)613659048  |z (OCoLC)739139194  |z (OCoLC)756544639  |z (OCoLC)880102411 
037 |a 978-3-540-77155-5  |b Springer  |n http://www.springerlink.com 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COD  |d STF  |d YNG  |d NUI  |d EBLCP  |d OCLCQ  |d MND  |d OCLCO   |d OCLCQ  |d OCLCF  |d BEDGE  |d VT2  |d OCLCQ  |d SLY  |d OCLCO  |d COO  |d YDXCP  |d IDEBK  |d OCL  |d OCLCO   |d OCLCQ  |d OCLCO  |d DEBSZ  |d OCLCQ  |d SHS  |d OCLCA  |d OCLCQ  |d UAB  |d ESU  |d OCLCQ  |d NJR  |d U3W   |d OCLCA  |d BUF  |d OCLCQ  |d CEF  |d TFW  |d WYU  |d ICG  |d YOU  |d W2U  |d UX1  |d OCLCQ  |d OL$  |d OCLCQ  |d AUD   |d ERF  |d WURST  |d OCLCQ  |d SFB  |d OCLCQ  |d DCT  |d EUX  |d OCLCQ  |d UKAHL  |d OCLCO  |d COM  |d OCLCO   |d OCLCQ  |d CSt 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COD  |d STF  |d YNG  |d NUI  |d EBLCP  |d OCLCQ  |d MND  |d OCLCO  |d OCLCQ  |d OCLCF  |d BEDGE  |d VT2  |d OCLCQ  |d SLY  |d OCLCO  |d COO  |d YDXCP  |d IDEBK  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d DEBSZ  |d OCLCQ 
049 |a MAIN 
050 4 |a QA76.9.A25  |b I574 2005eb 
072 7 |a COM053000  |2 bisacsh 
072 7 |a QA  |2 lcco 
072 7 |a URY  |2 bicssc 
082 0 4 |a 005.8  |2 22 
084 |a DAT 252f  |2 stub 
084 |a DAT 460f  |2 stub 
084 |a SS 4800  |2 rvk 
084 |a TP309-532  |2 clc 
111 2 |a International Workshop on Security Protocols  |n (13th :  |d 2005 :   |c Cambridge, England) 
111 2 |a International Workshop on Security Protocols  |n (13th :  |d 2005 :  |c Cambridge, England) 
245 1 0 |a Security protocols :  |b 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers /  |c Bruce Christianson [and others] (eds.) 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2007 
300 |a 1 online resource (ix, 345 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 4631 
504 |a Includes bibliographical references and index 
505 0 |a The System Likes You -- Experiences with Host-to-Host IPsec -- Experiences with Host-to-Host IPsec -- Repairing the Bluetooth Pairing Protocol -- Repairing the Bluetooth Pairing Protocol -- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags -- Keep on Blockin' in the Free World -- PIN (and Chip) or Signature: Beating the Cheating? -- PIN (and Chip) or Signature: Beating the Cheating? -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Multi-channel Protocols -- Multi-channel Protocols -- Combining Crypto with Biometrics: A New Human-Security Interface -- User-Friendly Grid Security Architecture and Protocols -- User-Friendly Grid Security Architecture and Protocols -- Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits with System Security CAPTCHAS -- The System Likes You? -- Enhancing Privacy with Shared Pseudo Random Sequences -- Enhancing Privacy with Shared Pseudo Random Sequences -- Non-repudiation and the Metaphysics of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols Are User-Unfriendly -- Understanding Why Some Network Protocols Are User-Unfriendly -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Listen Too Closely and You May Be Confused -- Listen Too Closely and You May Be Confused -- The Dining Freemasons (Security Protocols for Secret Societies) -- The Dining Freemasons (Security Protocols for Secret Societies) -- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) -- Safer Scripting Through Precompilation -- Safer Scripting Through Precompilation -- Implementing a Multi-hat PDA -- Implementing a Multi-hat PDA -- Anonymous Context Based Role Activation Mechanism -- Anonymous Context Based Role Activation Mechanism -- Topology of Covert Conflict -- The Initial Costs and Maintenance Costs of Protocols -- The Initial Costs and Maintenance Costs of Protocols -- Alice and Bob 
520 |a This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others 
588 0 |a Print version record 
596 |a 22 
650 0 |a Computer security  |v Congresses 
650 0 |a Computers  |x Access control  |v Congresses 
650 0 |a Cryptography  |v Congresses 
650 4 |a Computer science 
650 6 |a Cryptographie  |v Congrès 
650 6 |a Ordinateurs  |x Accès  |x Contrôle  |v Congrès 
650 6 |a Sécurité informatique  |v Congrès 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
650 7 |a Cryptography  |2 fast 
650 7 |a Informatique  |2 eclas 
650 0 7 |a Computer security  |2 cct 
650 0 7 |a Computers  |x Access control  |2 cct 
650 0 7 |a Cryptography  |2 cct 
653 0 0 |a algorithms 
653 0 0 |a algoritmen 
653 0 0 |a computer analysis 
653 0 0 |a computer networks 
653 0 0 |a computer sciences 
653 0 0 |a computeranalyse 
653 0 0 |a computernetwerken 
653 0 0 |a computers 
653 0 0 |a computerwetenschappen 
653 0 0 |a data management 
653 0 0 |a gegevensbeheer 
653 0 0 |a informatiesystemen 
653 0 0 |a information systems 
653 0 0 |a samenleving 
653 0 0 |a society 
653 1 0 |a Informatie- en communicatietechnologie (algemeen) 
653 1 0 |a Information and Communication Technology (General) 
655 4 |a Electronic books 
655 7 |a Conference papers and proceedings  |2 fast 
700 1 |a Christianson, Bruce  |1 http://viaf.org/viaf/18011908 
700 1 |a Christianson, Bruce 
776 0 8 |i Print version:  |a International Workshop on Security Protocols (13th : 2005 : Cambridge, England)  |t Security protocols.  |d Berlin ; New York : Springer, ©2007  |z 9783540771555  |z 3540771557  |w (DLC) 2007940529   |w (OCoLC)183257726 
776 0 8 |i Print version:  |a International Workshop on Security Protocols (13th : 2005 : Cambridge, England)  |t Security protocols.  |d Berlin ; New York : Springer, ©2007  |z 9783540771555  |z 3540771557  |w (DLC) 2007940529  |w (OCoLC)183257726 
830 0 |a LNCS sublibrary  |n SL 4,  |p Security and cryptology. 
830 0 |a Lecture notes in computer science ;  |v 4631  |x 0302-9743 
999 1 0 |i 84cf4611-662c-4134-80dc-3cc872da6e84  |l a13362177  |s US-CST  |m security_protocols13th_international_workshop_cambridge_uk_april_20_22_____2007_______sprina________________________________________international_worksh_______________e 
999 1 0 |i 84cf4611-662c-4134-80dc-3cc872da6e84  |l 11066797  |s US-ICU  |m security_protocols13th_international_workshop_cambridge_uk_april_20_22_____2007_______sprina________________________________________international_worksh_______________e 
999 1 1 |l a13362177  |s ISIL:US-CST  |t BKS  |a SUL INTERNET  |b 13362177-1001  |c INTERNET RESOURCE  |d ASIS  |x SUL  |y 13362177-1001  |p UNLOANABLE