|
" Security protocols XXI "
Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau (Eds.)
Document Type
|
:
|
BL
|
Record Number
|
:
|
605979
|
Doc. No
|
:
|
b435198
|
Main Entry
|
:
|
International Workshop on Security Protocols(21st :2013 :, Cambridge, England)
|
Title & Author
|
:
|
Security protocols XXI : 21st international workshop, Cambridge, UK, March 19-20, 2013 : revised selected papers /\ Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau (Eds.)
|
Publication Statement
|
:
|
Heidelberg ;New York :: Springer,, c2013
|
Series Statement
|
:
|
Lecture notes in computer science,; 8263
|
|
:
|
LNCS Sublibrary: SL 4 - Security and cryptology
|
Page. NO
|
:
|
1 online resource (ix, 264 p.) :: ill
|
ISBN
|
:
|
3642417175 (electronic bk.)
|
|
:
|
: 9783642417177 (electronic bk.)
|
|
:
|
3642417167
|
|
:
|
9783642417160
|
Notes
|
:
|
"This volume collects the revised proceedings of the 21st International Security Protocols Workshop, held in Sidney Sussex College, Cambridge during 19th and 20th March 2013."--Preface
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index
|
Contents
|
:
|
Introduction : What's happening on the other channel? (Transcript of discussion) / Bruce Christianson -- Towards new security primitives based on hard AI problems / Bin B. Zhu and Jeff Yan -- Towards new security primitives based on hard AI problems (Transcript of discussion) / Jeff Yan -- Towards a theory of application compartmentalisation / Robert N.M. Watson ... [et al.] -- Towards a theory of application compartmentalisation (Transcript of discussion) / Robert N.M. Watson -- Authentication for resilience : the case of SDN / Dongting Yu ... [et al.] -- Authentication for resilience : the case of SDN (Transcript of discussion) / Dongting Yu -- Verifiable postal voting / Josh Benaloh, Peter Y.A. Ryan, and Vanessa Teague -- End-to-end verifiable postal voting (Transcript of discussion) / Vanessa Teague -- Independent computations for safe remote electronic voting / Alec Yasinsac -- Independent computations for safe remote electronic voting (Transcript of discussion) / Alec Yasinsac -- ReDABLS : revisiting device attestation with bounded leakage of secrets / Jun Zhao ... [et al.] -- ReDABLS : revisiting device attestation with bounded leakage of secrets (Transcript of discussion) / Virgil Gligor -- Enhancements to prepare-and-measure based QKD protocols / Peter Y.A. Ryan and Bruce Christianson -- Enhancements to prepare-and-measure-based QKD protocols (Transcript of discussion) / Peter Y.A. Ryan -- Simple defences against vibration-based keystroke fingerprinting attacks / Rushil Khurana and Shishir Nagaraja -- Simple defences against vibration-based-keystroke fingerprinting attacks (Transcript of discussion) / Shishir Nagaraja -- Communication setup in anonymous messaging / Francesco Bergadano -- Communication setup in anonymous messaging (Transcript of discussion) / Francesco Bergadano -- Towards a stronger location integrity / Rubin Xi and Dongting Yu -- Towards a stronger location integrity (Transcript of discussion) / Rubin Xu -- Back channels can be useful! Layering authentication channels to provide covert communication / Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford -- Back channels can be useful! Layering authentication channels to provide covert communication (Transcript of discussion) / Mohammed H. Almeshekah -- Spraying Diffie-Hellman for secure key exchange in MANETs / Ariel Stulman, Jonathan Lahav, and Avraham Shmueli -- Spraying Diffie-Hellman for secure key exchange in MANETs (Transcript of discussion) / Ariel Stulman -- On the origin of yet another channel / Petr Švenda and Václav Matyáš -- On the origin of yet another channel (Transcript of discussion) / Petr Švenda -- Verifiable classroom voting : where cryptography meets pedagogy / Feng Hao, Dylan Clarke, and Carlton Shepherd -- Verifiable classroom voting : where cryptography meets pedagogy (Transcript of discussion) / Feng Hao -- Creative uses for the other channel
|
Abstract
|
:
|
This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security Protocols, held in Cambridge, UK, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What's Happening on the Other Channel?"
|
Subject
|
:
|
Computer security, Congresses
|
Subject
|
:
|
Cryptography, Congresses
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25I574 2013
|
|
:
|
QA76.9.A25I574 2013
|
Added Entry
|
:
|
Christianson, Bruce
|
Added Entry
|
:
|
Ohio Library and Information Network
|
Parallel Title
|
:
|
Security protocols 21
|
|
:
|
: Security protocols twenty-one
|
| |