Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:729794277:3256 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:729794277:3256?format=raw |
LEADER: 03256nam a22005055a 4500
001 013672503-1
005 20130614191334.0
008 130125s2013 gw | s ||0| 0|eng d
020 $a9783642362132
020 $a9783642362132
020 $a9783642362125
024 7 $a10.1007/978-3-642-36213-2$2doi
035 $a(Springer)9783642362132
040 $aSpringer
050 4 $aQA76.9.A25
072 7 $aURY$2bicssc
072 7 $aCOM053000$2bisacsh
082 04 $a005.82$223
100 1 $aChristianson, Bruce.
245 10 $aSecurity Protocols XVII :$b17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers /$cedited by Bruce Christianson, James A. Malcolm, Vashek Matyáš, Michael Roe.
260 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg :$bImprint: Springer,$c2013.
300 $aX, 367 p. 28 illus.$bdigital.
490 0 $aLecture Notes in Computer Science,$x0302-9743 ;$v7028
505 0 $aEvolutionary design of attack strategies -- Below the salt -- Attacking each other -- Bringing zero-knowledge proofs of knowledge to practice -- Towards a verified reference implementation of a trusted platform module -- Pretty good democracy -- Brief encounters with a random key graph -- Why I'm not an entropist -- A novel stateless authentication protocol -- Establishing distributed hidden friendship relations -- The final word.
520 $aThis book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Brief Encounters". In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
650 24 $aInformation Systems Applications (incl. Internet)
650 10 $aComputer science.
650 0 $aData encryption (Computer science)
650 0 $aComputer science.
650 0 $aComputer Communication Networks.
650 0 $aData protection.
650 0 $aComputers$xLaw and legislation.
650 0 $aInformation Systems.
650 24 $aData Encryption.
650 24 $aComputer Communication Networks.
650 24 $aManagement of Computing and Information Systems.
650 24 $aSystems and Data Security.
650 24 $aLegal Aspects of Computing.
700 1 $aMatyás̆, Vashek.
700 1 $aMalcolm, James A.
700 1 $aRoe, Michael.
776 08 $iPrinted edition:$z9783642362125
830 0 $aLecture notes in computer science ;$v7028.
988 $a20130502
906 $0VEN