Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers by Bruce ChristiansonSecurity Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers by Bruce Christianson

Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised…

byBruce ChristiansonEditorJames Malcolm, Vashek Matyá

Paperback | November 10, 2014

Pricing and Purchase Info

$92.97 online 
$110.50 list price save 15%
Earn 465 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".

Title:Security Protocols XXII: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised…Format:PaperbackDimensions:373 pagesPublished:November 10, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319123998

ISBN - 13:9783319123998

Reviews

Table of Contents

Preface.- Introduction: Collaborating with the Enemy (Transcript of Discussion).- Why Bother Securing DNS?.- Why Bother Securing DNS? (Transcript of Discussion).- Collaborating as normal: detecting systemic anomalies in your partner.- Collaborating as normal: detecting systemic anomalies in your partner (Transcript of Discussion).- Remark!: A Secure Protocol for Remote Exams.- Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion).- Red Queen's Race: APT win-win game.- Red Queen's Race: APT win-win game (Transcript of Discussion).- Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).- Non-collaborative attackers and how and where to defend vulnerable security protocols (Transcript of Discussion).- Dancing with the Adversary: A Tale of Wimps and Giants.- Dancing with the Adversary: a Tale of Wimps and Giants (Transcript of Discussion).- Better authentication: password revolution by evolution.- Better authentication password revolution by evolution (Transcript of Discussion).- Collaborating with the enemy on network management.- Collaborating with the enemy on network management (Transcript of Discussion).- Bootstrapping Adoption of the Pico Password Replacement System.- Bootstrapping adoption of the Pico password replacement system (Transcript of Discussion).- I Bought a New Security Token and All I Got Was This Lousy Phish - Relay Attacks on Visual Code Authentication Schemes.- Relay attacks on visual code authentication schemes (Transcript of Discussion).- Censorship Resistance as a Side-Effect.- Censorship Resistance as a Side-Effect (Transcript of Discussion).- On the Feasibility of a Technological Response to the Surveillance Morass.- On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion).- Strange Bedfellows: How and When to Work with Your Enemy.- Preface V.- Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion).- On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions.- On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions (Transcript of Discussion).- On node capturing attacker strategies.- On node capturing attacker strategies (Transcript of Discussion).- On the reliability of network measurement techniques used for malware traffic analysis.- On the reliability of network measurement techniques used for malware traffic analysis (Transcript of Discussion).- Beyond Trust.- Beyond Trust (Transcript of Discussion).- Fawkescoin A cryptocurrency without public-key cryptography.- FawkesCoin: A cryptocurrency without public-key cryptography (Transcript of Discussion).