Skip to main content
main-content

Über dieses Buch

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life".

Inhaltsverzeichnis

Frontmatter

2012 | OriginalPaper | Buchkapitel

Introduction: Bringing Protocols to Life (Transcript of Discussion)

Bruce Christianson

2012 | OriginalPaper | Buchkapitel

Secure Internet Voting Protocol for Overseas Military Voters

Todd R. Andel, Alec Yasinsac

2012 | OriginalPaper | Buchkapitel

Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion)

Todd R. Andel

2012 | OriginalPaper | Buchkapitel

Self-enforcing Electronic Voting

Feng Hao, Brian Randell, Dylan Clarke

2012 | OriginalPaper | Buchkapitel

Self-enforcing Electronic Voting (Transcript of Discussion)

Feng Hao

2012 | OriginalPaper | Buchkapitel

Approaches to Modelling Security Scenarios with Domain-Specific Languages

Phillip J. Brooke, Richard F. Paige, Christopher Power

2012 | OriginalPaper | Buchkapitel

Approaches to Modelling Security Scenarios with Domain-Specific Languages(Transcript of Discussion)

Phillip J. Brooke

2012 | OriginalPaper | Buchkapitel

The Casino and the OODA Loop

Why Our Protocols Always Eventually Fail
Sandy Clark, Matt Blaze, Jonathan M. Smith

2012 | OriginalPaper | Buchkapitel

The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion)

Matt Blaze

2012 | OriginalPaper | Buchkapitel

Statistical Metrics for Individual Password Strength

Joseph Bonneau

2012 | OriginalPaper | Buchkapitel

Statistical Metrics for Individual Password Strength (Transcript of Discussion)

Joseph Bonneau

2012 | OriginalPaper | Buchkapitel

Street-Level Trust Semantics for Attribute Authentication

Tiffany Hyun-Jin Kim, Virgil Gligor, Adrian Perrig

2012 | OriginalPaper | Buchkapitel

Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion)

Virgil Gligor

2012 | OriginalPaper | Buchkapitel

Analysis of Issues and Challenges of E-Voting in the UK

Dylan Clarke, Feng Hao, Brian Randell

2012 | OriginalPaper | Buchkapitel

Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion)

Dylan Clarke

2012 | OriginalPaper | Buchkapitel

Protocol Governance: The Elite, or the Mob?

Ross Anderson

2012 | OriginalPaper | Buchkapitel

Protocol Governance: The Elite, or the Mob? (Transcript of Discussion)

Ross Anderson

2012 | OriginalPaper | Buchkapitel

Usability Issues in Security

Yuko Murayama, Yasuhiro Fujihara, Yoshia Saito, Dai Nishioka

2012 | OriginalPaper | Buchkapitel

Usability Issues in Security (Transcript of Discussion)

Yuko Murayama

2012 | OriginalPaper | Buchkapitel

Usable Privacy by Visual and Interactive Control of Information Flow

Shah Mahmood, Yvo Desmedt

2012 | OriginalPaper | Buchkapitel

Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion)

Shah Mahmood

2012 | OriginalPaper | Buchkapitel

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System

Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro

2012 | OriginalPaper | Buchkapitel

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion)

Mauro Conti

2012 | OriginalPaper | Buchkapitel

Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices

Oliver Stannard, Frank Stajano

2012 | OriginalPaper | Buchkapitel

Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion)

Frank Stajano

2012 | OriginalPaper | Buchkapitel

Stayin’ Alive: Aliveness as an Alternative to Authentication

Jonathan Anderson, Robert N. M. Watson

2012 | OriginalPaper | Buchkapitel

Stayin’ Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion)

Jonathan Anderson

2012 | OriginalPaper | Buchkapitel

Paul Revere Protocols

Paul Syverson

2012 | OriginalPaper | Buchkapitel

Paul Revere Protocols (Transcript of Discussion)

Paul Syverson

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise