skip to content
Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers Preview this item
ClosePreview this item
Checking...

Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers

Author: Frank Stajano; Jonathan Anderson, (Computer scientist); Bruce Christianson; Vashek Matyáš
Publisher: Cham : Springer, 2017.
Series: Lecture notes in computer science, 10476.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Frank Stajano; Jonathan Anderson, (Computer scientist); Bruce Christianson; Vashek Matyáš
ISBN: 9783319710754 3319710753
OCLC Number: 1017967485
Description: 1 online resource.
Contents: Multiple Objectives of Lawful-Surveillance Protocols --
Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System --
Assuring the Safety of Asymmetric Social Protocols --
Simulating Perceptions of Security --
Self-Attestation of Things --
Making Decryption Accountable --
Extending Full Disk Encryption for the Future --
Key Exchange with the Help of a Public Ledger --
Reconciling Multiple Objectives --
Politics or Markets? --
The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations --
A Security Perspective on Publication Metrics --
Controlling Your Neighbors Bandwidth for Fun and Profit --
Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come --
Security from Disjoint Paths: Is It Possible? --
End to End Security Is Not Enough --
Auditable PAKEs: Approaching Fair Exchange Without a TTP.
Series Title: Lecture notes in computer science, 10476.; LNCS sublibrary., SL 4,, Security and cryptology.
Responsibility: Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyáš, editors.

Abstract:

This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1017967485> # Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "1017967485" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computers_security_general> ; # Computers--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/ethical_&_social_aspects_of_it> ; # Ethical & social aspects of IT
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/legal_aspects_of_it> ; # Legal aspects of IT
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/coding_theory_&_cryptology> ; # Coding theory & cryptology
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/law_science_&_technology> ; # Law--Science & Technology
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computers_information_technology> ; # Computers--Information Technology
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computers_social_aspects_general> ; # Computers--Social Aspects--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4656024648#Topic/information_retrieval> ; # Information retrieval
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/4656024648#Meeting/international_workshop_on_security_protocols_25th_2017_cambridge_great_britain> ; # International Workshop on Security Protocols (25th : 2017 : Cambridge, Great Britain)
    schema:datePublished "2017" ;
    schema:description "Multiple Objectives of Lawful-Surveillance Protocols -- Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System -- Assuring the Safety of Asymmetric Social Protocols -- Simulating Perceptions of Security -- Self-Attestation of Things -- Making Decryption Accountable -- Extending Full Disk Encryption for the Future -- Key Exchange with the Help of a Public Ledger -- Reconciling Multiple Objectives -- Politics or Markets? -- The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations -- A Security Perspective on Publication Metrics -- Controlling Your Neighbors Bandwidth for Fun and Profit -- Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come -- Security from Disjoint Paths: Is It Possible? -- End to End Security Is Not Enough -- Auditable PAKEs: Approaching Fair Exchange Without a TTP."@en ;
    schema:description "This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/4656024648#Person/christianson_bruce> ; # Bruce Christianson
    schema:editor <http://experiment.worldcat.org/entity/work/data/4656024648#Person/anderson_jonathan_computer_scientist> ; # (Computer scientist) Jonathan Anderson
    schema:editor <http://experiment.worldcat.org/entity/work/data/4656024648#Person/stajano_frank> ; # Frank Stajano
    schema:editor <http://experiment.worldcat.org/entity/work/data/4656024648#Person/matyas_vashek> ; # Vashek Matyáš
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4656024648> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4656024648#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4656024648#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4656024648#CreativeWork/> ;
    schema:name "Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers"@en ;
    schema:productID "1017967485" ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-319-71075-4> ;
    schema:url <http://liverpool.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-71075-4> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=5595944> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/9783319710754> ;
    schema:url <https://doi.org/10.1007/978-3-319-71075-4> ;
    schema:url <http://uproxy.library.dc-uoit.ca/login?url=http://link.springer.com/10.1007/978-3-319-71075-4> ;
    schema:url <https://login.proxy.lib.strath.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-71075-4> ;
    schema:url <http://link.springer.com/10.1007/978-3-319-71075-4> ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-71075-4> ;
    schema:workExample <http://worldcat.org/isbn/9783319710754> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-71075-4> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB8N8620> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1017967485> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4656024648#Meeting/international_workshop_on_security_protocols_25th_2017_cambridge_great_britain> # International Workshop on Security Protocols (25th : 2017 : Cambridge, Great Britain)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/4656024648#Place/cambridge_great_britain> ; # Cambridge, Great Britain)
    schema:name "International Workshop on Security Protocols (25th : 2017 : Cambridge, Great Britain)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Person/anderson_jonathan_computer_scientist> # (Computer scientist) Jonathan Anderson
    a schema:Person ;
    schema:familyName "Anderson" ;
    schema:givenName "Jonathan" ;
    schema:name "(Computer scientist) Jonathan Anderson" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Person/christianson_bruce> # Bruce Christianson
    a schema:Person ;
    schema:familyName "Christianson" ;
    schema:givenName "Bruce" ;
    schema:name "Bruce Christianson" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Person/matyas_vashek> # Vashek Matyáš
    a schema:Person ;
    schema:familyName "Matyáš" ;
    schema:givenName "Vashek" ;
    schema:name "Vashek Matyáš" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Person/stajano_frank> # Frank Stajano
    a schema:Person ;
    schema:familyName "Stajano" ;
    schema:givenName "Frank" ;
    schema:name "Frank Stajano" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Place/cambridge_great_britain> # Cambridge, Great Britain)
    a schema:Place ;
    schema:name "Cambridge, Great Britain)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1017967485> ; # Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1017967485> ; # Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/coding_theory_&_cryptology> # Coding theory & cryptology
    a schema:Intangible ;
    schema:name "Coding theory & cryptology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computers_information_technology> # Computers--Information Technology
    a schema:Intangible ;
    schema:name "Computers--Information Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computers_security_general> # Computers--Security--General
    a schema:Intangible ;
    schema:name "Computers--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/computers_social_aspects_general> # Computers--Social Aspects--General
    a schema:Intangible ;
    schema:name "Computers--Social Aspects--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/ethical_&_social_aspects_of_it> # Ethical & social aspects of IT
    a schema:Intangible ;
    schema:name "Ethical & social aspects of IT"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/information_retrieval> # Information retrieval
    a schema:Intangible ;
    schema:name "Information retrieval"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/law_science_&_technology> # Law--Science & Technology
    a schema:Intangible ;
    schema:name "Law--Science & Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4656024648#Topic/legal_aspects_of_it> # Legal aspects of IT
    a schema:Intangible ;
    schema:name "Legal aspects of IT"@en ;
    .

<http://uproxy.library.dc-uoit.ca/login?url=http://link.springer.com/10.1007/978-3-319-71075-4>
    rdfs:comment "eBook available for UOIT via SpringerLink. Click link to access" ;
    .

<http://worldcat.org/entity/work/data/4656024648#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1017967485> ; # Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers
    .

<http://worldcat.org/isbn/9783319710754>
    a schema:ProductModel ;
    schema:isbn "3319710753" ;
    schema:isbn "9783319710754" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1017967485> ; # Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science," ;
    .

<http://www.worldcat.org/title/-/oclc/1017967485>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1017967485> ; # Security protocols XXV : 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised selected papers
    schema:dateModified "2019-05-15" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.