Security protocols: 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5087 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | IX, 285 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783642049033 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035788567 | ||
003 | DE-604 | ||
005 | 20150113 | ||
007 | t| | ||
008 | 091026s2009 xx ad|| |||| 10||| eng d | ||
015 | |a 09,N40,0046 |2 dnb | ||
016 | 7 | |a 996813454 |2 DE-101 | |
020 | |a 9783642049033 |c kart. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 978-3-642-04903-3 | ||
024 | 3 | |a 9783642049033 | |
028 | 5 | 2 | |a 12771844 |
035 | |a (OCoLC)496271484 | ||
035 | |a (DE-599)DNB996813454 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Security protocols |b 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers |c Bruce Christianson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a IX, 285 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5087 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2006 |z Cambridge |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Christianson, Bruce |d 1958- |e Sonstige |0 (DE-588)1064909507 |4 oth | |
711 | 2 | |a International Workshop on Security Protocols |n 14 |d 2006 |c Cambridge |j Sonstige |0 (DE-588)6105000-3 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5087 |w (DE-604)BV000000607 |9 5087 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018647945&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018647945 |
Datensatz im Suchindex
_version_ | 1820875183550889984 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
P U T T I NG T HE H U M AN B A CK IN T HE P R O T O C OL ( T R A N S C R
I PT OF D I S C U S S I O N) . . . 1
BRUCE CHRISTIANSON
COMPOSING SECURITY METRICS (TRANSCRIPT OF DISCUSSION) 3
MATT BLAZE
PUTTING THE HUMAN BACK IN VOTING PROTOCOLS 13
PETER Y.A. RYAN AND THEA PEACOCK
PUTTING THE HUMAN BACK IN VOTING PROTOCOLS (TRANSCRIPT OF DISCUSSION) 20
PETER Y.A. RYAN
TOWARDS A SECURE APPLICATION-SEMANTIC AWARE POLICY ENFORCEMENT
ARCHITECTURE 26
SRIJITH K. NAIR, BRUNO CRISPO, AND ANDREW S. TANENBAUM
TOWARDS A SECURE APPLICATION-SEMANTIC AWARE POLICY ENFORCEMENT
ARCHITECTURE (TRANSCRIPT OF DISCUSSION) 32
SRIJITH K. NAIR
PHISH AND CHIPS: TRADITIONAL AND NEW RECIPES FOR ATTACKING EMV 40 BEN
ADIDA, MIKE BOND, JOLYON CLULOW, AMERSON LIN, STEVEN MURDOCH, ROSS
ANDERSON, AND RON RIVEST
PHISH AND CHIPS (TRANSCRIPT OF DISCUSSION) 49
MIKE BOND
WHERE NEXT FOR FORMAL METHODS? 52
JAMES HEATHER AND KUN WEI
WHERE NEXT FOR FORMAL METHODS? (TRANSCRIPT OF DISCUSSION) 59 JAMES
HEATHER
CORDIAL SECURITY PROTOCOL PROGRAMMING: THE OBOI PROTOCOL LANGUAGE 62
PER HARALD MYRVANG AND TAGE STABELL-KULO
CORDIAL SECURITY PROTOCOL PROGRAMMING (TRANSCRIPT OF DISCUSSION) 85 TAGE
STABELL-KULO
PRIVACY-SENSITIVE CONGESTION CHARGING 97
ALASTAIR R. BERESFORD, JONATHAN J. DAVIES. AND ROBERT K. HARLE
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/996813454
DIGITALISIERT DURCH
IMAGE 2
VIH TABLE OF CONTENTS
PRIVACY-SENSITIVE CONGESTION CHARGING (TRANSCRIPT OF DISCUSSION) 105
ALASTAIR R. BERESFORD
THE VALUE OF LOCATION INFORMATION: A EUROPEAN-WIDE STUDY 112 DAN CVRCEK,
MAREK KUMPOST, VASHEK MATYAS, AND GEORGE DANEZIS
THE VALUE OF LOCATION INFORMATION (TRANSCRIPT OF DISCUSSION) 122 VASHEK
MATYAS
UPDATE ON PIN OR SIGNATURE (TRANSCRIPT OF DISCUSSION) 128
VASHEK MATYAS
INNOVATIONS FOR GRID SECURITY FROM TRUSTED COMPUTING: PROTOCOL SOLUTIONS
TO SHARING OF SECURITY RESOURCE 132
WENBO MAO, ANDREW MARTIN, HAI JIN, AND HUANGUO ZHANG
INNOVATIONS FOR GRID SECURITY FROM TRUSTED COMPUTING (TRANSCRIPT OF
DISCUSSION) 150
WENBO MAO
THE MAN-IN-THE-MIDDLE DEFENCE 153
ROSS ANDERSON AND MIKE BOND
THE MAN-IN-THE-MIDDLE DEFENCE (TRANSCRIPT OF DISCUSSION) 157
ROSS ANDERSON
USING HUMAN INTERACTIVE PROOFS TO SECURE HUMAN-MACHINE INTERACTIONS VIA
UNTRUSTED INTERMEDIARIES 164
CHRIS J. MITCHELL
USING HUMAN INTERACTIVE PROOFS TO SECURE HUMAN-MACHINE INTERACTIONS VIA
UNTRUSTED INTERMEDIARIES (TRANSCRIPT OF DISCUSSION) 171
CHRIS J. MITCHELL
SECURE DISTRIBUTED HUMAN COMPUTATION (EXTENDED ABSTRACT) 177 CRAIG
GENTRY, ZULFIKAR RAMZAN, AND STUART STUBBLEBINE
SECURE DISTRIBUTED HUMAN COMPUTATION (TRANSCRIPT OF DISCUSSION) 181
CRAIG GENTRY
BOT, CYBORG AND AUTOMATED TURING TEST (OR "PUTTING THE HUMANOID IN THE
PROTOCOL") 190
JEFF YAN
BOT, CYBORG AND AUTOMATED TURING TEST (TRANSCRIPT OF DISCUSSION) 198
JEFF YAN
A 2-ROUND ANONYMOUS VETO PROTOCOL 202
FENG HAO AND PIOTR ZIELINSKI
IMAGE 3
TABLE OF CONTENTS IX
A 2-ROUND ANONYMOUS VETO PROTOCOL (TRANSCRIPT OF DISCUSSION) 212 FENG
HAO
HOW TO SPEAK AN AUTHENTICATION SECRET SECURELY FROM AN EAVESDROPPER 215
LAWRENCE O'GORMAN, LYNNE BROTMAN, AND MICHAEL SAMMON
HOW TO SPEAK AN AUTHENTICATION SECRET SECURELY FROM AN EAVESDROPPER
(TRANSCRIPT OF DISCUSSION) 230
LAWRENCE O'GORMAN
SECRET PUBLIC KEY PROTOCOLS REVISITED 237
HOON WEI LIM AND KENNETH G. PATERSON
SECRET PUBLIC KEY PROTOCOLS REVISITED (TRANSCRIPT OF DISCUSSION) 257
HOON WEI LIM
VINTAGE BIT CRYPTOGRAPHY 261
BRUCE CHRISTIANSON AND ALEX SHAFARENKO
VINTAGE BIT CRYPTOGRAPHY (TRANSCRIPT OF DISCUSSION) 266
ALEX SHAFARENKO
USABILITY OF SECURITY MANAGEMENT: DEFINING THE PERMISSIONS OF GUESTS 276
MATTHEW JOHNSON AND FRANK STAJANO
USABILITY OF SECURITY MANAGEMENT: DEFINING THE PERMISSIONS OF GUESTS
(TRANSCRIPT OF DISCUSSION) 284
MATTHEW JOHNSON
THE LAST WORD 286
EVE
AUTHOR INDEX 287 |
any_adam_object | 1 |
author_GND | (DE-588)1064909507 |
building | Verbundindex |
bvnumber | BV035788567 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 465f |
ctrlnum | (OCoLC)496271484 (DE-599)DNB996813454 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035788567</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">091026s2009 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N40,0046</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">996813454</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642049033</subfield><subfield code="c">kart. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-04903-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642049033</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12771844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)496271484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB996813454</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols</subfield><subfield code="b">14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers</subfield><subfield code="c">Bruce Christianson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 285 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5087</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2006</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security Protocols</subfield><subfield code="n">14</subfield><subfield code="d">2006</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)6105000-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5087</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5087</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018647945&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018647945</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2006 Cambridge gnd-content |
genre_facet | Konferenzschrift 2006 Cambridge |
id | DE-604.BV035788567 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:34Z |
institution | BVB |
institution_GND | (DE-588)6105000-3 |
isbn | 9783642049033 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018647945 |
oclc_num | 496271484 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | IX, 285 S. Ill., graph. Darst. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers Bruce Christianson ... (eds.) Berlin [u.a.] Springer 2009 IX, 285 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5087 Literaturangaben Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2006 Cambridge gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Sicherheitsprotokoll (DE-588)4709127-7 s Kryptologie (DE-588)4033329-2 s Trusted Computing (DE-588)7562931-8 s Christianson, Bruce 1958- Sonstige (DE-588)1064909507 oth International Workshop on Security Protocols 14 2006 Cambridge Sonstige (DE-588)6105000-3 oth Lecture notes in computer science 5087 (DE-604)BV000000607 5087 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018647945&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers Lecture notes in computer science Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)7562931-8 (DE-588)4709127-7 (DE-588)1071861417 |
title | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers |
title_auth | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers |
title_exact_search | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers |
title_full | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers Bruce Christianson ... (eds.) |
title_fullStr | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers Bruce Christianson ... (eds.) |
title_full_unstemmed | Security protocols 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers Bruce Christianson ... (eds.) |
title_short | Security protocols |
title_sort | security protocols 14th international workshop cambridge uk march 27 29 2006 revised selected papers |
title_sub | 14th international workshop, Cambridge, UK, March 27 - 29, 2006 ; revised selected papers |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computersicherheit Kryptologie Trusted Computing Sicherheitsprotokoll Konferenzschrift 2006 Cambridge |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018647945&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT christiansonbruce securityprotocols14thinternationalworkshopcambridgeukmarch27292006revisedselectedpapers AT internationalworkshoponsecurityprotocolscambridge securityprotocols14thinternationalworkshopcambridgeukmarch27292006revisedselectedpapers |