54,98 €
52,23 €
AGGIUNGI AL CARRELLO
TRAMA
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".

SOMMARIO
Preface.- Introduction: Collaborating with the Enemy (Transcript of Discussion).- Why Bother Securing DNS?.- Why Bother Securing DNS? (Transcript of Discussion).- Collaborating as normal: detecting systemic anomalies in your partner.- Collaborating as normal: detecting systemic anomalies in your partner (Transcript of Discussion).- Remark!: A Secure Protocol for Remote Exams.- Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion).- Red Queen’s Race: APT win-win game.- Red Queen’s Race: APT win-win game (Transcript of Discussion).- Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version).- Non-collaborative attackers and how and where to defend vulnerable security protocols (Transcript of Discussion).- Dancing with the Adversary: A Tale of Wimps and Giants.- Dancing with the Adversary: a Tale of Wimps and Giants (Transcript of Discussion).- Better authentication: password revolution by evolution.- Better authentication password revolution by evolution (Transcript of Discussion).- Collaborating with the enemy on network management.- Collaborating with the enemy on network management (Transcript of Discussion).- Bootstrapping Adoption of the Pico Password Replacement System.- Bootstrapping adoption of the Pico password replacement system (Transcript of Discussion).- I Bought a New Security Token and All I Got Was This Lousy Phish — Relay Attacks on Visual Code Authentication Schemes.- Relay attacks on visual code authentication schemes (Transcript of Discussion).- Censorship Resistance as a Side-Effect.- Censorship Resistance as a Side-Effect (Transcript of Discussion).- On the Feasibility of a Technological Response to the Surveillance Morass.- On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion).- Strange Bedfellows: How and When to Work with Your Enemy.- Preface V.- Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion).- On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions.- On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions (Transcript of Discussion).- On node capturing attacker strategies.- On node capturing attacker strategies (Transcript of Discussion).- On the reliability of network measurement techniques used for malware traffic analysis.- On the reliability of network measurement techniques used for malware traffic analysis (Transcript of Discussion).- Beyond Trust.- Beyond Trust (Transcript of Discussion).- Fawkescoin A cryptocurrency without public-key cryptography.- FawkesCoin: A cryptocurrency without public-key cryptography (Transcript of Discussion).

ALTRE INFORMAZIONI
  • Condizione: Nuovo
  • ISBN: 9783319123998
  • Collana: Lecture Notes in Computer Science
  • Dimensioni: 235 x 155 mm Ø 5854 gr
  • Formato: Brossura
  • Illustration Notes: XI, 373 p. 40 illus.
  • Pagine Arabe: 373
  • Pagine Romane: xi