An edition of Security Protocols XX (2012)

Security Protocols XX

20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
December 25, 2021 | History
An edition of Security Protocols XX (2012)

Security Protocols XX

20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012.
Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life".

Publish Date
Language
English
Pages
277

Buy this book

Previews available in: English

Edition Availability
Cover of: Security Protocols XX
Security Protocols XX: 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers
2012, Springer Berlin Heidelberg, Imprint: Springer
electronic resource : in English
Cover of: Security Protocols XX
Cover of: Security Protocols XX

Add another edition?

Book Details


Table of Contents

<p>Introduction: Bringing Protocols to Life (Transcript of Discussion)
Secure Internet Voting Protocol for Overseas Military Voters
Secure Internet Voting Protocol for Overseas Military Voters<p>(Transcript of Discussion)
Self-enforcing Electronic Voting
Self-enforcing Electronic Voting (Transcript of Discussion)
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
^
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
^
^^
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p></p></p></p>Secure Internet Voting Protocol for Overseas Military Voters
Secure Internet Voting Protocol for Overseas Military Voters<p>(Transcript of Discussion)
Self-enforcing Electronic Voting
Self-enforcing Electronic Voting (Transcript of Discussion)
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
^
^^
Statistical Metrics for Individual Password Strength(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
^
^^
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p></p></p>Self-enforcing Electronic Voting
Self-enforcing Electronic Voting (Transcript of Discussion)
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages
Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
^
^^
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
^
^^
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p></p>Approaches to Modelling Security Scenarios with Domain-Specific<p>Languages (Transcript of Discussion)
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
^
^^
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK<p>(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
^
^^
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Transcript of Discussion)
The Last Word.</p></p></p></p></p></p></p></p></p></p></p></p></p></p>The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail
The Casino and the OODA Loop: Why Our Protocols Always<p>Eventually Fail (Transcript of Discussion)
Statistical Metrics for Individual Password Strength
^
^^
Statistical Metrics for Individual Password Strength<p>(Transcript of Discussion)
Street-Level Trust Semantics for Attribute Authentication
Street-Level Trust Semantics for Attribute Authentication<p>(Transcript of Discussion)
Analysis of Issues and Challenges of E-Voting in the UK
Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
Protocol Governance: The Elite, or the Mob?
Protocol Governance: The Elite, or the Mob?<p>(Transcript of Discussion)
Usability Issues in Security
Usability Issues in Security (Transcript of Discussion)
Usable Privacy by Visual and Interactive Control of Information<p>Flow
Usable Privacy by Visual and Interactive Control of Information<p>Flow (Transcript of Discussion)
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System
Sense-And-Trace: A Privacy Preserving Distributed Geolocation<p>Tracking System (Transcript of Discussion)
^
^^
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices
Am I in Good Company? A Privacy-Protecting Protocol<p>for Cooperating Ubiquitous Computing Devices</p><p>(Transcript of Discussion)
Stayin’ Alive: Aliveness as an Alternative to Authentication
Stayin’ Alive: Aliveness as an Alternative to Authentication<p>(Transcript of Discussion)
Paul Revere Protocols
Paul Revere Protocols (Tra.
^^

Edition Notes

Published in
Berlin, Heidelberg
Series
Lecture Notes in Computer Science -- 7622

Classifications

Dewey Decimal Class
004.6
Library of Congress
TK5105.5-5105.9, QA76.9.A25 I574 2012, QA75.5-76.95

The Physical Object

Format
[electronic resource] :
Pagination
X, 277 p. 29 illus.
Number of pages
277

ID Numbers

Open Library
OL27086857M
Internet Archive
securityprotocol00chri_472
ISBN 13
9783642356940
LCCN
2012954009

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
December 25, 2021 Edited by ImportBot import existing book
November 13, 2020 Edited by MARC Bot import existing book
August 24, 2020 Edited by ImportBot import existing book
July 7, 2019 Created by MARC Bot Imported from Internet Archive item record.