Security Protocols
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers(3957 Lecture Notes in Computer Science)
36%
Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers(3957 Lecture Notes in Computer Science)

Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers(3957 Lecture Notes in Computer Science)


     0     
5
4
3
2
1



Available


X
About the Book

Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was “Authentic Privacy.” Traditionally we have based authentication upon a rather strong notion of identity, and have then built other security services on top of authentication. Perhaps if we want a more nuanced notion of privacy, then we need to re-examine some of our assu- tions, particularly when attackers and defenders share the same resources and infrastructure. The position papers published here have been revised by the participants in the workshop, and are followed by edited (heavily in some cases) transcripts of parts of the discussions which they led. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, to Johanna Hunt at the University of Hertfordshire for organizing the logistics of the workshop and orchestrating the production of these proceedings, to Lori KlimaszewskaoftheUniversityofCambridgeComputingServicefortranscribing the audio tapes (in which “viruses without halos” could have caused havoc but didn’t), and to Donald Hunt for impeccable copyediting. Finally, it is both a sadness and a pleasure to pay our tribute to David Wheeler,oneoftheoriginalforty-ninersattheCambridgeComputerLaboratory and author of the initial orders for EDSAC. The second version of initial orders is the Platonic bootstrap.

Table of Contents:
Introduction: Authentic Privacy.- Limits to Anonymity When Using Credentials.- Limits to Anonymity When Using Credentials (Transcript of Discussion).- A Cryptographic Framework for the Controlled Release of Certified Data.- A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion).- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA.- One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion).- Authentication Components: Engineering Experiences and Guidelines.- Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion).- Accountable Privacy.- Accountable Privacy (Transcript of Discussion).- Toward a Broader View of Security Protocols.- Toward a Broader View of Security Protocols (Transcript of Discussion).- Privacy, Control and Internet Mobility.- Privacy, Control and Internet Mobility (Transcript of Discussion).- Controlling Who Tracks Me.- Controlling Who Tracks Me (Transcript of Discussion).- BLIND: A Complete Identity Protection Framework for End-Points.- BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion).- Privacy Is Linking Permission to Purpose.- Privacy is Linking Permission to Purpose (Transcript of Discussion).- Establishing Trust with Privacy.- Establishing Trust with Privacy (Transcript of Discussion).- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System.- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion).- The Dancing Bear: A New Way of Composing Ciphers.- The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion).- Identity and Location.- Identity and Location (Transcript of Discussion).- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion).- Pseudonymity in the Light of Evidence-Based Trust.- Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion).- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection.- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion).- Why Are We Authenticating (Transcript of Discussion).- Anonymous Authentication.- Anonymous Authentication (Transcript of Discussion).- Towards a Mechanism for Discretionary Overriding of Access Control.- Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion).- Last Orders.


Best Sellers


Product Details
  • ISBN-13: 9783540409250
  • Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
  • Publisher Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Height: 229 mm
  • No of Pages: 390
  • Returnable: Y
  • Series Title: 3957 Lecture Notes in Computer Science
  • Width: 152 mm
  • ISBN-10: 3540409254
  • Publisher Date: 13 Sep 2006
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Series Title: 3957 Lecture Notes in Computer Science
  • Sub Title: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers(3957 Lecture Notes in Computer Science)
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG -
Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers(3957 Lecture Notes in Computer Science)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Protocols: 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers(3957 Lecture Notes in Computer Science)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!