Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers /
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4631 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- The System Likes You
- Experiences with Host-to-Host IPsec
- Experiences with Host-to-Host IPsec
- Repairing the Bluetooth Pairing Protocol
- Repairing the Bluetooth Pairing Protocol
- Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags
- Keep on Blockin’ in the Free World
- PIN (and Chip) or Signature: Beating the Cheating?
- PIN (and Chip) or Signature: Beating the Cheating?
- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
- Authorisation Subterfuge by Delegation in Decentralised Networks
- Authorisation Subterfuge by Delegation in Decentralised Networks
- Multi-channel Protocols
- Multi-channel Protocols
- Combining Crypto with Biometrics: A New Human-Security Interface
- User-Friendly Grid Security Architecture and Protocols
- User-Friendly Grid Security Architecture and Protocols
- Countering Automated Exploits with System Security CAPTCHAS
- Countering Automated Exploits with System Security CAPTCHAS
- The System Likes You?
- Enhancing Privacy with Shared Pseudo Random Sequences
- Enhancing Privacy with Shared Pseudo Random Sequences
- Non-repudiation and the Metaphysics of Presence
- Non-repudiation and the Metaphysics of Presence
- Understanding Why Some Network Protocols Are User-Unfriendly
- Understanding Why Some Network Protocols Are User-Unfriendly
- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
- Listen Too Closely and You May Be Confused
- Listen Too Closely and You May Be Confused
- The Dining Freemasons (Security Protocols for Secret Societies)
- The Dining Freemasons (Security Protocols for Secret Societies)
- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)
- Safer Scripting Through Precompilation
- Safer Scripting Through Precompilation
- Implementing a Multi-hat PDA
- Implementing a Multi-hat PDA
- Anonymous Context Based Role Activation Mechanism
- Anonymous Context Based Role Activation Mechanism
- Topology of Covert Conflict
- The Initial Costs and Maintenance Costs of Protocols
- The Initial Costs and Maintenance Costs of Protocols
- Alice and Bob.