Security Protocols XX [E-Book] : 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers / edited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson.
Christianson, Bruce.
Malcolm, James. / Stajano, Frank. / Anderson, Jonathan.
Berlin, Heidelberg : Springer, 2012
X, 277 p. 29 illus. digital.
englisch
9783642356940
10.1007/978-3-642-35694-0
Lecture notes in computer science ; 7622
Full Text
Table of Contents:
  • Introduction: Bringing Protocols to Life (Transcript of Discussion)
  • Secure Internet Voting Protocol for Overseas Military Voters
  • Secure Internet Voting Protocol for Overseas Military Voters(Transcript of Discussion)
  • Self-enforcing Electronic Voting
  • Self-enforcing Electronic Voting (Transcript of Discussion)
  • Approaches to Modelling Security Scenarios with Domain-SpecificLanguages
  • Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion)
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion)
  • Statistical Metrics for Individual Password Strength
  • Statistical Metrics for Individual Password Strength(Transcript of Discussion)
  • Street-Level Trust Semantics for Attribute Authentication
  • Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion)
  • Analysis of Issues and Challenges of E-Voting in the UK
  • Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
  • Protocol Governance: The Elite, or the Mob?
  • Protocol Governance: The Elite, or the Mob?(Transcript of Discussion)
  • Usability Issues in Security
  • Usability Issues in Security (Transcript of Discussion)
  • Usable Privacy by Visual and Interactive Control of InformationFlow
  • Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion)
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion)
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices(Transcript of Discussion)
  • Stayin’ Alive: Aliveness as an Alternative to Authentication
  • Stayin’ Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion)
  • Paul Revere Protocols
  • Paul Revere Protocols (Transcript of Discussion)
  • The Last Word.Secure Internet Voting Protocol for Overseas Military Voters
  • Secure Internet Voting Protocol for Overseas Military Voters(Transcript of Discussion)
  • Self-enforcing Electronic Voting
  • Self-enforcing Electronic Voting (Transcript of Discussion)
  • Approaches to Modelling Security Scenarios with Domain-SpecificLanguages
  • Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion)
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion)
  • Statistical Metrics for Individual Password Strength
  • Statistical Metrics for Individual Password Strength(Transcript of Discussion)
  • Street-Level Trust Semantics for Attribute Authentication
  • Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion)
  • Analysis of Issues and Challenges of E-Voting in the UK
  • Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
  • Protocol Governance: The Elite, or the Mob?
  • Protocol Governance: The Elite, or the Mob?(Transcript of Discussion)
  • Usability Issues in Security
  • Usability Issues in Security (Transcript of Discussion)
  • Usable Privacy by Visual and Interactive Control of InformationFlow
  • Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion)
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion)
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices(Transcript of Discussion)
  • Stayin’ Alive: Aliveness as an Alternative to Authentication
  • Stayin’ Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion)
  • Paul Revere Protocols
  • Paul Revere Protocols (Transcript of Discussion)
  • The Last Word.Self-enforcing Electronic Voting
  • Self-enforcing Electronic Voting (Transcript of Discussion)
  • Approaches to Modelling Security Scenarios with Domain-SpecificLanguages
  • Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion)
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion)
  • Statistical Metrics for Individual Password Strength
  • Statistical Metrics for Individual Password Strength(Transcript of Discussion)
  • Street-Level Trust Semantics for Attribute Authentication
  • Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion)
  • Analysis of Issues and Challenges of E-Voting in the UK
  • Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
  • Protocol Governance: The Elite, or the Mob?
  • Protocol Governance: The Elite, or the Mob?(Transcript of Discussion)
  • Usability Issues in Security
  • Usability Issues in Security (Transcript of Discussion)
  • Usable Privacy by Visual and Interactive Control of InformationFlow
  • Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion)
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion)
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices(Transcript of Discussion)
  • Stayin’ Alive: Aliveness as an Alternative to Authentication
  • Stayin’ Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion)
  • Paul Revere Protocols
  • Paul Revere Protocols (Transcript of Discussion)
  • The Last Word.Approaches to Modelling Security Scenarios with Domain-SpecificLanguages (Transcript of Discussion)
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion)
  • Statistical Metrics for Individual Password Strength
  • Statistical Metrics for Individual Password Strength(Transcript of Discussion)
  • Street-Level Trust Semantics for Attribute Authentication
  • Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion)
  • Analysis of Issues and Challenges of E-Voting in the UK
  • Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
  • Protocol Governance: The Elite, or the Mob?
  • Protocol Governance: The Elite, or the Mob?(Transcript of Discussion)
  • Usability Issues in Security
  • Usability Issues in Security (Transcript of Discussion)
  • Usable Privacy by Visual and Interactive Control of InformationFlow
  • Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion)
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion)
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices(Transcript of Discussion)
  • Stayin’ Alive: Aliveness as an Alternative to Authentication
  • Stayin’ Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion)
  • Paul Revere Protocols
  • Paul Revere Protocols (Transcript of Discussion)
  • The Last Word.The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail
  • The Casino and the OODA Loop: Why Our Protocols AlwaysEventually Fail (Transcript of Discussion)
  • Statistical Metrics for Individual Password Strength
  • Statistical Metrics for Individual Password Strength(Transcript of Discussion)
  • Street-Level Trust Semantics for Attribute Authentication
  • Street-Level Trust Semantics for Attribute Authentication(Transcript of Discussion)
  • Analysis of Issues and Challenges of E-Voting in the UK
  • Analysis of Issues and Challenges of E-Voting in the UK(Transcript of Discussion)
  • Protocol Governance: The Elite, or the Mob?
  • Protocol Governance: The Elite, or the Mob?(Transcript of Discussion)
  • Usability Issues in Security
  • Usability Issues in Security (Transcript of Discussion)
  • Usable Privacy by Visual and Interactive Control of InformationFlow
  • Usable Privacy by Visual and Interactive Control of InformationFlow (Transcript of Discussion)
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System
  • Sense-And-Trace: A Privacy Preserving Distributed GeolocationTracking System (Transcript of Discussion)
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices
  • Am I in Good Company? A Privacy-Protecting Protocolfor Cooperating Ubiquitous Computing Devices(Transcript of Discussion)
  • Stayin’ Alive: Aliveness as an Alternative to Authentication
  • Stayin’ Alive: Aliveness as an Alternative to Authentication(Transcript of Discussion)
  • Paul Revere Protocols
  • Paul Revere Protocols (Tra.