Ebook: Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers
Author: Bruce Christianson (auth.) Bruce Christianson Bruno Crispo James A. Malcolm Michael Roe (eds.)
- Tags: Computer Communication Networks, Data Encryption, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Information Systems Applications (incl.Internet), Computers and Society
- Series: Lecture Notes in Computer Science 5964
- Year: 2010
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
Content:
Front Matter....Pages -
When Is a Protocol Broken? (Transcript of Discussion)....Pages 1-2
Measurable Security through Isotropic Channels....Pages 3-12
Measurable Security through Isotropic Channels (Transcript of Discussion)....Pages 13-19
Modeling Partial Attacks with Alloy (Transcript of Discussion)....Pages 20-33
Resiliency Aspects of Security Protocols....Pages 34-36
Privacy Amplification with Social Networks....Pages 37-57
Privacy Amplification with Social Networks (Transcript of Discussion)....Pages 58-73
Reconciling Multiple IPsec and Firewall Policies....Pages 74-80
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion)....Pages 81-97
Anchor-Less Secure Session Mobility....Pages 98-103
Anchor-Less Secure Session Mobility (Transcript of Discussion)....Pages 104-109
A Model for System-Based Analysis of Voting Systems....Pages 110-113
A Model for System-Based Analysis of Voting Systems (Transcript of Discussion)....Pages 114-130
Multi-Channel Key Agreement Using Encrypted Public Key Exchange....Pages 131-132
Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion)....Pages 133-138
On the Security of the EMV Secure Messaging API (Extended Abstract)....Pages 139-146
On the Security of the EMV Secure Messaging API (Transcript of Discussion)....Pages 147-149
Distributed Double Spending Prevention....Pages 150-151
Distributed Double Spending Prevention (Transcript of Discussion)....Pages 152-165
Robbing the Bank with a Theorem Prover....Pages 166-170
Robbing the Bank with a Theorem Prover....Pages 171-171
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet....Pages 172-177
Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet....Pages 178-188
Towards Working with Small Atomic Functions....Pages 189-190
Towards Working with Small Atomic Functions....Pages 191-200
Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment....Pages 201-203
Private Yet Abuse Resistant Open Publishing....Pages 204-221
Private Yet Abuse Resistant Open Publishing (Transcript of Discussion)....Pages 222-243
Instructions to Reviewers....Pages 244-255
Back Matter....Pages 256-256
....Pages -
Download the book Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)