Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers /

This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussio...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Christianson, Bruce (Επιμελητής έκδοσης), Malcolm, James (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
Σειρά:Lecture Notes in Computer Science, 7061
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04583nam a22005655i 4500
001 978-3-662-45921-8
003 DE-He213
005 20151204185035.0
007 cr nn 008mamaa
008 141201s2014 gw | s |||| 0|eng d
020 |a 9783662459218  |9 978-3-662-45921-8 
024 7 |a 10.1007/978-3-662-45921-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Security Protocols XVIII  |h [electronic resource] :  |b 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers /  |c edited by Bruce Christianson, James Malcolm. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2014. 
300 |a XII, 267 p. 19 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7061 
505 0 |a Introduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It’s the Anthropology, Stupid! -- It’s the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation. 
520 |a This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security". 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
700 1 |a Christianson, Bruce.  |e editor. 
700 1 |a Malcolm, James.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662459201 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7061 
856 4 0 |u http://dx.doi.org/10.1007/978-3-662-45921-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)