Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers /

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Christianson, Bruce (Editor), Crispo, Bruno (Editor), Malcolm, James A. (Editor), Roe, Michael (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Series:Lecture Notes in Computer Science, 4631
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • The System Likes You
  • Experiences with Host-to-Host IPsec
  • Experiences with Host-to-Host IPsec
  • Repairing the Bluetooth Pairing Protocol
  • Repairing the Bluetooth Pairing Protocol
  • Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags
  • Keep on Blockin’ in the Free World
  • PIN (and Chip) or Signature: Beating the Cheating?
  • PIN (and Chip) or Signature: Beating the Cheating?
  • Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
  • Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
  • Authorisation Subterfuge by Delegation in Decentralised Networks
  • Authorisation Subterfuge by Delegation in Decentralised Networks
  • Multi-channel Protocols
  • Multi-channel Protocols
  • Combining Crypto with Biometrics: A New Human-Security Interface
  • User-Friendly Grid Security Architecture and Protocols
  • User-Friendly Grid Security Architecture and Protocols
  • Countering Automated Exploits with System Security CAPTCHAS
  • Countering Automated Exploits with System Security CAPTCHAS
  • The System Likes You?
  • Enhancing Privacy with Shared Pseudo Random Sequences
  • Enhancing Privacy with Shared Pseudo Random Sequences
  • Non-repudiation and the Metaphysics of Presence
  • Non-repudiation and the Metaphysics of Presence
  • Understanding Why Some Network Protocols Are User-Unfriendly
  • Understanding Why Some Network Protocols Are User-Unfriendly
  • Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
  • Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
  • Listen Too Closely and You May Be Confused
  • Listen Too Closely and You May Be Confused
  • The Dining Freemasons (Security Protocols for Secret Societies)
  • The Dining Freemasons (Security Protocols for Secret Societies)
  • On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)
  • Safer Scripting Through Precompilation
  • Safer Scripting Through Precompilation
  • Implementing a Multi-hat PDA
  • Implementing a Multi-hat PDA
  • Anonymous Context Based Role Activation Mechanism
  • Anonymous Context Based Role Activation Mechanism
  • Topology of Covert Conflict
  • The Initial Costs and Maintenance Costs of Protocols
  • The Initial Costs and Maintenance Costs of Protocols
  • Alice and Bob.