Security protocols XXVI : 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers /: 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. (2018)
- Record Type:
- Book
- Title:
- Security protocols XXVI : 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers /: 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. (2018)
- Main Title:
- Security protocols XXVI : 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers
- Other Titles:
- Security protocols 26
- Further Information:
- Note: Vashek Matyáš, Petr Švenda, Frank Stajano, Bruce Christianson, Jonathan Anderson (eds.).
- Editors:
- Matyás̆, Vashek
Švenda, Petr
Stajano, Frank
Christianson, Bruce
Anderson, Jonathan - Other Names:
- International Workshop on Security Protocols, 26th
- Contents:
- Raven Authentication Service -- Attacks and Countermeasures -- Raven Authentication Service -- Attacks and Countermeasures (Transcript of Discussion) -- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations -- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion) -- Non-Monotonic Security Protocols and Failures in Financial Intermediation -- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion) -- HoneyPAKEs -- HoneyPAKEs (Transcript of Discussion) -- Entropy crowdsourcing -- protocols for link key updates in wireless sensor Networks -- Entropy crowdsourcing -- protocols for link key updates in wireless sensor networks (Transcript of Discussion) -- Daemones non Operantur Nisi per Artem -- Daemones non Operantur Nisi per Artem (Transcript of Discussion) -- Intentionality and agency in security -- Intentionality and agency in security (Transcript of Discussion) -- Incentives in Security Protocols -- Incentives in Security Protocols (Transcript of Discussion) -- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System -- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion) -- How does match-fixing inform computer game security -- How does match-fixing inform computer game security? (Transcript of Discussion) -- From Secure Messaging to Secure Collaboration -- From SecureRaven Authentication Service -- Attacks and Countermeasures -- Raven Authentication Service -- Attacks and Countermeasures (Transcript of Discussion) -- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations -- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion) -- Non-Monotonic Security Protocols and Failures in Financial Intermediation -- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion) -- HoneyPAKEs -- HoneyPAKEs (Transcript of Discussion) -- Entropy crowdsourcing -- protocols for link key updates in wireless sensor Networks -- Entropy crowdsourcing -- protocols for link key updates in wireless sensor networks (Transcript of Discussion) -- Daemones non Operantur Nisi per Artem -- Daemones non Operantur Nisi per Artem (Transcript of Discussion) -- Intentionality and agency in security -- Intentionality and agency in security (Transcript of Discussion) -- Incentives in Security Protocols -- Incentives in Security Protocols (Transcript of Discussion) -- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System -- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion) -- How does match-fixing inform computer game security -- How does match-fixing inform computer game security? (Transcript of Discussion) -- From Secure Messaging to Secure Collaboration -- From Secure Messaging to Secure Collaboration (Transcript of Discussion) -- Requirements for Root of Trust Establishment -- Requirements for Root of Trust Establishment (Transcript of Discussion) -- User Authentication for the Internet of Things -- User Authentication for the Internet of Things (Transcript of Discussion) -- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough -- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion) -- Making Bitcoin Legal -- Making Bitcoin Legal (Transcript of Discussion) -- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do -- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion) -- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices -- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). . … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xi, 305 pages), illustrations (some color)
- Subjects:
- 005.8
Computer security -- Congresses
Security
Software Engineering/Programming and Operating Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
Artificial Intelligence
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030032517
3030032515 - Related ISBNs:
- 9783030032500
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed December 3, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.377996
- Ingest File:
- 02_359.xml