Security protocols : 12th international workshop, Cambridge, UK, April 26-28, 2004 : revised selected papers / Bruce Christianson [and others] (eds.).

By: (12th : International Workshop on Security Protocols (12th : 2004 : Cambridge, England)
Contributor(s): Christianson, Bruce
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 3957.; Lecture notes in computer science: 3957.; LNCS sublibrary: Publisher: Berlin ; New York : Springer, 2006Description: 1 online resource (ix, 323 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540409267; 3540409262; 3540409254; 9783540409250Subject(s): Computer security -- Congresses | Cryptography -- Congresses | Sécurité informatique -- Congrès | Cryptographie -- Congrès | Ordinateurs -- Accès -- Contrôle -- Congrès | Computer security | Computers -- Access control | Cryptography | Informatique | Computer security | Cryptography | algoritmen | algorithms | computeranalyse | computer analysis | computers | samenleving | society | informatiesystemen | information systems | computerwetenschappen | computer sciences | computernetwerken | computer networks | gegevensbeheer | data management | operating systems | Information and Communication Technology (General) | Informatie- en communicatietechnologie (algemeen)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Security protocols.DDC classification: 005.8 LOC classification: QA76.9.A25 | I574 2004ebOther classification: TP309-532 Online resources: Click here to access online
Contents:
Introduction : authentic privacy / Bruce Christianson -- Limits to anonymity when using credentials / Andreas Pashalidis and Chris J. Mitchell -- Discussion -- A cryptograpic framework for the controlled release of certified data / Endre Bangerter, Jan Camenisch and Anna Lysyanskaya -- Discussion -- One user, many hats; and, sometimes, no hat : towards a secure yet usable PDA / Frank Stajano -- Discussion -- Authentication components : engineering experiences and guidelines / Pasi Eronen and Jari Arkko -- Discussion -- Accountable privacy / Mike Burmester, Yvo Desmedt, Rebecca N. Wright and Alec Yasinsac -- Discussion -- Toward a broader view of security protocols / Matt Blaze -- Discussion -- Privacy, control and Internet mobility / Tuomas Aura and Alf Zugenmaier -- Discussion -- ontrolling who tracks me / Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan and Kan Zhang -- Discussion -- BLIND : a complete identity protection framework for end-points / Jukka Ylitalo and Pekka Nikander -- Discussion -- Privacy is linking permission to purpose / Fabio Massacci and Nicola Zannone -- Discussion -- Establishing trust with privacy / Laurent Bussard and Refik Molva -- iscussion -- Safe and private data sharing with turtle : friends team-up and beat the system / Bogdan C. Popescu, Bruno Crispo and Andrew S. Tanenbaum -- Discussion -- The dancing bear : a new way of composing ciphers / Ross Anderson -- Discussion -- Identity and location / Dieter Gollmann -- Discussion -- Security of emergent properties in ad-hoc networks (transcript of discussion) / Virgil Gligor -- Pseudonymity in the light of evidence-based trust / Daniel Cvrcek and Vaclav Matyas, Jr. -- Discussion -- Secure processor consistent with both foreign software protection and user privacy protection / Mikio Hashimoto, Hiroyoshi Haruki and Takeshi Kawabata -- Discussion -- Why are we authenticating (transcript of discussion) / Mark Lomas -- Anonymous authentication / Partha Das Chowdhury, Bruce Christianson and James Malcolm -- Discussion -- Towards a mechanism for discretionary overriding of access control / Erik Rissanen, Babak Sadighi Firozabadi and Marek Sergot -- Discussion -- Last orders / David Wheeler.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Introduction : authentic privacy / Bruce Christianson -- Limits to anonymity when using credentials / Andreas Pashalidis and Chris J. Mitchell -- Discussion -- A cryptograpic framework for the controlled release of certified data / Endre Bangerter, Jan Camenisch and Anna Lysyanskaya -- Discussion -- One user, many hats; and, sometimes, no hat : towards a secure yet usable PDA / Frank Stajano -- Discussion -- Authentication components : engineering experiences and guidelines / Pasi Eronen and Jari Arkko -- Discussion -- Accountable privacy / Mike Burmester, Yvo Desmedt, Rebecca N. Wright and Alec Yasinsac -- Discussion -- Toward a broader view of security protocols / Matt Blaze -- Discussion -- Privacy, control and Internet mobility / Tuomas Aura and Alf Zugenmaier -- Discussion -- ontrolling who tracks me / Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan and Kan Zhang -- Discussion -- BLIND : a complete identity protection framework for end-points / Jukka Ylitalo and Pekka Nikander -- Discussion -- Privacy is linking permission to purpose / Fabio Massacci and Nicola Zannone -- Discussion -- Establishing trust with privacy / Laurent Bussard and Refik Molva -- iscussion -- Safe and private data sharing with turtle : friends team-up and beat the system / Bogdan C. Popescu, Bruno Crispo and Andrew S. Tanenbaum -- Discussion -- The dancing bear : a new way of composing ciphers / Ross Anderson -- Discussion -- Identity and location / Dieter Gollmann -- Discussion -- Security of emergent properties in ad-hoc networks (transcript of discussion) / Virgil Gligor -- Pseudonymity in the light of evidence-based trust / Daniel Cvrcek and Vaclav Matyas, Jr. -- Discussion -- Secure processor consistent with both foreign software protection and user privacy protection / Mikio Hashimoto, Hiroyoshi Haruki and Takeshi Kawabata -- Discussion -- Why are we authenticating (transcript of discussion) / Mark Lomas -- Anonymous authentication / Partha Das Chowdhury, Bruce Christianson and James Malcolm -- Discussion -- Towards a mechanism for discretionary overriding of access control / Erik Rissanen, Babak Sadighi Firozabadi and Marek Sergot -- Discussion -- Last orders / David Wheeler.

There are no comments for this item.

to post a comment.

Powered by Koha