Security Protocols XXVIII: 28th International Workshop, Cambridge, UK, March 27–28, 2023, Revised Selected Papers

Author:   Frank Stajano ,  Vashek Matyáš ,  Bruce Christianson ,  Jonathan Anderson
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2023
Volume:   14186
ISBN:  

9783031430329


Pages:   271
Publication Date:   22 October 2023
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $129.35 Quantity:  
Add to Cart

Share |

Security Protocols XXVIII: 28th International Workshop, Cambridge, UK, March 27–28, 2023, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Frank Stajano ,  Vashek Matyáš ,  Bruce Christianson ,  Jonathan Anderson
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2023
Volume:   14186
Weight:   0.438kg
ISBN:  

9783031430329


ISBN 10:   3031430328
Pages:   271
Publication Date:   22 October 2023
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Sleepwalking into Disaster? Requirements Engineering for Digital Cash.- Transporting a Secret Using Destructively-Read Memory.- Authentication of IT Professionals in the Wild - A Survey.- Incentives and Censorship Resistance for Mixnets Revisited.- Can’t Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices.- Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches.- Trusted Introductions for Secure Messaging.- Choosing Your Friends: Shaping Ethical Use of Anonymity Networks.- One Protocol to Rule them All? On Securing Interoperable Messaging.- If it’s Provably Secure, it Probably isn’t: Why Learning from Proof Failure is Hard.- Towards Human-Centric Endpoint Security.- Determining an Economic Value of High Assurance for Commodity Software Security.- Blind Auditing and Probabilistic Access Controls.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List