skip to main content
Show Results with:

Security protocols XXVI : 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers / Vashek Matyáš, Petr Švenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.).

International Workshop on Security Protocols (26th : 2018 : Cambridge, England)

Cham, Switzerland : Springer, 2018.

Online access

 2 related resources
  • Title:
    Security protocols XXVI : 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers / Vashek Matyáš, Petr Švenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.).
  • Author: International Workshop on Security Protocols (26th : 2018 : Cambridge, England)
  • Contributor: Vashek Matyás̆ editor.;
    Petr Švenda editor.;
    Frank Stajano editor.;
    Bruce Christianson editor.;
    Jonathan Anderson editor.
  • Other Titles: Variant Title: Security protocols 26
  • Subjects: Computer security -- Congresses; Security; Software Engineering/Programming and Operating Systems; Information Systems Applications (incl. Internet); Computer Communication Networks; Artificial Intelligence; Computer security; Electronic books; Conference papers and proceedings;
    Dewey: 005.8
  • Rights: Terms governing use: Copyright.
    Access restrictions: NON_PRINT_LEGAL_DEPOSIT
  • Publication Details: Cham, Switzerland : Springer, 2018.
  • Language: English
  • Description: Contents: Raven Authentication Service -- Attacks and Countermeasures -- Raven Authentication Service -- Attacks and Countermeasures (Transcript of Discussion) -- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations -- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion) -- Non-Monotonic Security Protocols and Failures in Financial Intermediation -- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion) -- HoneyPAKEs -- HoneyPAKEs (Transcript of Discussion) -- Entropy crowdsourcing -- protocols for link key updates in wireless sensor Networks -- Entropy crowdsourcing -- protocols for link key updates in wireless sensor networks (Transcript of Discussion) -- Daemones non Operantur Nisi per Artem -- Daemones non Operantur Nisi per Artem (Transcript of Discussion) -- Intentionality and agency in security --
    Contents: Intentionality and agency in security (Transcript of Discussion) -- Incentives in Security Protocols -- Incentives in Security Protocols (Transcript of Discussion) -- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System -- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion) -- How does match-fixing inform computer game security -- How does match-fixing inform computer game security? (Transcript of Discussion) -- From Secure Messaging to Secure Collaboration -- From Secure Messaging to Secure Collaboration (Transcript of Discussion) -- Requirements for Root of Trust Establishment -- Requirements for Root of Trust Establishment (Transcript of Discussion) -- User Authentication for the Internet of Things -- User Authentication for the Internet of Things (Transcript of Discussion) -- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough --
    Contents: Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion) -- Making Bitcoin Legal -- Making Bitcoin Legal (Transcript of Discussion) -- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do -- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion) -- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices -- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). .
  • Identifier: ISBN 9783030032517 (electronic bk.); ISBN 3030032515 (electronic bk.); ISBN (print)
    10.1007/978-3-030-03251-7 doi; BNB GBB917518; System number: 019199645
  • Notes: Includes author index.
  • Physical Description: 1 online resource (xi, 305 pages) : illustrations (some color).
  • Series: Lecture notes in computer science ; 11286
    LNCS sublibrary. SL 4, Security and cryptology
  • Shelfmark(s): General Reference Collection DRT ELD.DS.377996
  • UIN: BLL01019199645

Searching Remote Databases, Please Wait