Coverart for item
The Resource Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, Bruce Christianson...[et al.] (eds.), (electronic book)

Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, Bruce Christianson...[et al.] (eds.), (electronic book)

Label
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
Title
Security protocols XIX
Title remainder
19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
Statement of responsibility
Bruce Christianson...[et al.] (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
I574 2011eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2011
http://bibfra.me/vocab/lite/meetingName
International Workshop on Security Protocols
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Christianson, Bruce
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7114
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Data encryption (Computer science)
Label
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, Bruce Christianson...[et al.] (eds.), (electronic book)
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)
  • Ross Anderson
  • Pico: No More Passwords!
  • --
  • Pico: No More Passwords! (Transcript of Discussion)
  • Frank Stajano
  • Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords
  • Joseph Bonneau
  • Getting Web Authentication Right (Transcript of Discussion)
  • Joseph Bonneau
  • Introduction: Alice Doesn't Live Here Anymore (Transcript)
  • When Context Is Better Than Identity: Authentication
  • Context Using Empirical Channels
  • Bangdao Chen, Long Hoang Nguyen and Andrew William Roscoe
  • When Context Is Better Than Identity (Transcript of Discussion)
  • Bangdao Chen
  • Selective Location Blinding Using Hash Chains
  • Gabriele Lenzini, Sjouke Mauw and Jun Pang
  • Selective Location Blinding Using Hash Chains (Transcript of Discussion)
  • Sjouke Mauw
  • Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces
  • Bruce Christianson
  • Alf Zugenmaier
  • Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)
  • Alf Zugenmaier
  • How to Sync with Alice
  • Feng Hao and Peter Y. A. Ryan
  • How to Sync with Alice (Transcript of Discussion)
  • Feng Hao
  • Attack Detection vs. Privacy - How to Find the Link or How to Hide It?
  • Ji{caron}rí Kůr, Vashek Matyáš, Andriy Stetsko and Petr Švenda
  • Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion)
  • His Late Master's Voice: Barking for Location Privacy
  • Ji{caron}rí Kůr and Andriy Stetsko
  • The Sense of Security and a Countermeasure for the False Sense
  • Yuko Murayama, Yasuhiro Fujihara and Dai Nishioka
  • The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion)
  • James Malcolm
  • Towards a Theory of Trust in Networks of Humans and Computers
  • Virgil Gligor and Jeannette M. Wing
  • Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)
  • Virgil Gligor
  • Gearing Up: How to Eat Your Cryptocake and Still Have It
  • Mike Burmester
  • Alex Shafarenko and Bruce Christianson
  • Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion)
  • Alex Shafarenko
  • Make Noise and Whisper: A Solution to Relay Attacks
  • Omar Choudary and Frank Stajano
  • Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)
  • Omar Choudary
  • Scrambling for Lightweight Censorship Resistance
  • Joseph Bonneau and Rubin Xu
  • Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)
  • His Late Master's Voice (Transcript of Discussion)
  • Rubin Xu
  • The Metaplace Security Model
  • Michael Roe
  • The Metaplace Security Model (Transcript of Discussion)
  • Michael Roe
  • One-Way Cryptography
  • Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu, et al.
  • One-Way Cryptography (Transcript of Discussion)
  • Matt Blaze
  • How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)
  • Mike Burmester
  • Jonathan Anderson, Frank Stajano and Robert N. M. Watson
  • How to Keep Bad Papers Out of Conferences (Transcript of Discussion)
  • Jonathan Anderson
  • Can We Fix the Security Economics of Federated Authentication?
  • Ross Anderson
Control code
SPR773697442
Dimensions
unknown
Extent
1 online resource (ix, 380 p.)
File format
unknown
Form of item
online
Isbn
9783642258664
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote
Label
Security protocols XIX : 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers, Bruce Christianson...[et al.] (eds.), (electronic book)
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion)
  • Ross Anderson
  • Pico: No More Passwords!
  • --
  • Pico: No More Passwords! (Transcript of Discussion)
  • Frank Stajano
  • Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords
  • Joseph Bonneau
  • Getting Web Authentication Right (Transcript of Discussion)
  • Joseph Bonneau
  • Introduction: Alice Doesn't Live Here Anymore (Transcript)
  • When Context Is Better Than Identity: Authentication
  • Context Using Empirical Channels
  • Bangdao Chen, Long Hoang Nguyen and Andrew William Roscoe
  • When Context Is Better Than Identity (Transcript of Discussion)
  • Bangdao Chen
  • Selective Location Blinding Using Hash Chains
  • Gabriele Lenzini, Sjouke Mauw and Jun Pang
  • Selective Location Blinding Using Hash Chains (Transcript of Discussion)
  • Sjouke Mauw
  • Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces
  • Bruce Christianson
  • Alf Zugenmaier
  • Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)
  • Alf Zugenmaier
  • How to Sync with Alice
  • Feng Hao and Peter Y. A. Ryan
  • How to Sync with Alice (Transcript of Discussion)
  • Feng Hao
  • Attack Detection vs. Privacy - How to Find the Link or How to Hide It?
  • Ji{caron}rí Kůr, Vashek Matyáš, Andriy Stetsko and Petr Švenda
  • Attack Detection vs Privacy - How to Find the Link or How to Hide It (Transcript of Discussion)
  • His Late Master's Voice: Barking for Location Privacy
  • Ji{caron}rí Kůr and Andriy Stetsko
  • The Sense of Security and a Countermeasure for the False Sense
  • Yuko Murayama, Yasuhiro Fujihara and Dai Nishioka
  • The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion)
  • James Malcolm
  • Towards a Theory of Trust in Networks of Humans and Computers
  • Virgil Gligor and Jeannette M. Wing
  • Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)
  • Virgil Gligor
  • Gearing Up: How to Eat Your Cryptocake and Still Have It
  • Mike Burmester
  • Alex Shafarenko and Bruce Christianson
  • Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion)
  • Alex Shafarenko
  • Make Noise and Whisper: A Solution to Relay Attacks
  • Omar Choudary and Frank Stajano
  • Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)
  • Omar Choudary
  • Scrambling for Lightweight Censorship Resistance
  • Joseph Bonneau and Rubin Xu
  • Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)
  • His Late Master's Voice (Transcript of Discussion)
  • Rubin Xu
  • The Metaplace Security Model
  • Michael Roe
  • The Metaplace Security Model (Transcript of Discussion)
  • Michael Roe
  • One-Way Cryptography
  • Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu, et al.
  • One-Way Cryptography (Transcript of Discussion)
  • Matt Blaze
  • How to Keep Bad Papers Out of Conferences (with Minimum Reviewer Effort)
  • Mike Burmester
  • Jonathan Anderson, Frank Stajano and Robert N. M. Watson
  • How to Keep Bad Papers Out of Conferences (Transcript of Discussion)
  • Jonathan Anderson
  • Can We Fix the Security Economics of Federated Authentication?
  • Ross Anderson
Control code
SPR773697442
Dimensions
unknown
Extent
1 online resource (ix, 380 p.)
File format
unknown
Form of item
online
Isbn
9783642258664
Level of compression
unknown
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...