Limit search to available items
Book Cover
E-book
Author International Workshop on Security Protocols (21st : 2013 : Cambridge, Great Britain)

Title Security protocols XXI : 21st international workshop, Cambridge, UK, March 19-20, 2013, revised selected papers / Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau (Eds.)
Published Heidelberg ; New York : Springer, ©2013

Copies

Description 1 online resource (ix, 264 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 8263
LNCS Sublibrary: SL 4 - Security and cryptology
Lecture notes in computer science ; 8263
LNCS sublibrary. SL 4, Security and cryptology
Contents Introduction: What's Happening on the Other Channel? (Transcript of Discussion) / Bruce Christianson -- Towards New Security Primitives Based on Hard AI Problems / Bin B. Zhu, Jeff Yan -- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion) / Jeff Yan -- Towards a Theory of Application Compartmentalisation / Robert N.M. Watson, Steven J. Murdoch, Khilan Gudka -- Towards a Theory of Application Compartmentalisation (Transcript of Discussion) / Robert N.M. Watson -- Authentication for Resilience: The Case of SDN / Dongting Yu [and others] -- Authentication for Resilience: The Case of SDN (Transcript of Discussion) / Dongting Yu -- Verifiable Postal Voting / Josh Benaloh, Peter Y.A. Ryan, Vanessa Teague -- End-to-End Verifiable Postal Voting (Transcript of Discussion) / Vanessa Teague -- Independent Computations for Safe Remote Electronic Voting / Alec Yasinsac
Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion) / Alec Yasinsac -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets / Jun Zhao [and others] -- ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion) / Virgil Gligor -- Enhancements to Prepare-and-Measure Based QKD Protocols / Peter Y.A. Ryan, Bruce Christianson -- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion) / Peter Y.A. Ryan -- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks / Rushil Khurana, Shishir Nagaraja -- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks (Transcript of Discussion) / Shishir Nagaraja -- Communication Setup in Anonymous Messaging / Francesco Bergadano -- Communication Setup in Anonymous Messaging (Transcript of Discussion) / Francesco Bergadano
Towards a Stronger Location Integrity / Rubin Xu, Dongting Yu -- Towards a Stronger Location Integrity (Transcript of Discussion) / Rubin Xu -- Back Channels Can Be Useful! -- Layering Authentication Channels to Provide Covert Communication / Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford -- Back Channels Can Be Useful! -- Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion) / Mohammed H. Almeshekah -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs / Ariel Stulman, Jonathan Lahav, Avraham Shmueli -- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion) / Ariel Stulman -- On the Origin of Yet another Channel / Petr Švenda, Václav Matyáš -- On the Origin of Yet another Channel (Transcript of Discussion) / Petr Švenda -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy / Feng Hao, Dylan Clarke, Carlton Shepherd -- Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion) / Feng Hao
Summary This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security Protocols, held in Cambridge, UK, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What's Happening on the Other Channel?"
Notes "This volume collects the revised proceedings of the 21st International Security Protocols Workshop, held in Sidney Sussex College, Cambridge during 19th and 20th March 2013"--Preface
Bibliography Includes bibliographical references and author index
Notes Print version record
Subject Computer security -- Congresses
Cryptography -- Congresses
Computer security.
Computer Security
Computer security
Cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Christianson, Bruce
ISBN 9783642417177
3642417175
Other Titles Security protocols 21
Security protocols twenty-one