Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers

Author:   Vashek Matyáš ,  Petr Švenda ,  Frank Stajano ,  Bruce Christianson
Publisher:   Springer Nature Switzerland AG
Edition:   2018 ed.
Volume:   11286
ISBN:  

9783030032500


Pages:   305
Publication Date:   24 November 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Vashek Matyáš ,  Petr Švenda ,  Frank Stajano ,  Bruce Christianson
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   2018 ed.
Volume:   11286
Weight:   0.492kg
ISBN:  

9783030032500


ISBN 10:   3030032507
Pages:   305
Publication Date:   24 November 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Raven Authentication Service - Attacks and Countermeasures.- Raven Authentication Service - Attacks and Countermeasures (Transcript of Discussion).- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations.- Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations (Transcript of Discussion).- Non-Monotonic Security Protocols and Failures in Financial Intermediation.- Non-Monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion).- HoneyPAKEs.- HoneyPAKEs (Transcript of Discussion).- Entropy crowdsourcing - protocols for link key updates in wireless sensor Networks.- Entropy crowdsourcing - protocols for link key updates in wireless sensor networks (Transcript of Discussion).- Daemones non Operantur Nisi per Artem.- Daemones non Operantur Nisi per Artem (Transcript of Discussion).- Intentionality and agency in security.- Intentionality and agency in security (Transcript of Discussion).- Incentives in Security Protocols.- Incentives in Security Protocols (Transcript of Discussion).- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System.- Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion).- How does match-fixing inform computer game security.- How does match-fixing inform computer game security? (Transcript of Discussion).- From Secure Messaging to Secure Collaboration.- From Secure Messaging to Secure Collaboration (Transcript of Discussion).- Requirements for Root of Trust Establishment.- Requirements for Root of Trust Establishment (Transcript of Discussion).- User Authentication for the Internet of Things.- User Authentication for the Internet of Things (Transcript of Discussion).- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough.- Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough (Transcript of Discussion).- Making Bitcoin Legal.- Making Bitcoin Legal (Transcript of Discussion).- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do.- On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do (Transcript of Discussion).- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.- Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion). 

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List