000 | 04244nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-71075-4 | ||
003 | DE-He213 | ||
005 | 20240730201451.0 | ||
007 | cr nn 008mamaa | ||
008 | 171128s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319710754 _9978-3-319-71075-4 |
||
024 | 7 |
_a10.1007/978-3-319-71075-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity Protocols XXV _h[electronic resource] : _b25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers / _cedited by Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyáš. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXI, 307 p. 19 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10476 |
|
505 | 0 | _aMultiple Objectives of Lawful-Surveillance Protocols -- Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System -- Assuring the Safety of Asymmetric Social Protocols -- Simulating Perceptions of Security -- Self-Attestation of Things -- Making Decryption Accountable -- Extending Full Disk Encryption for the Future -- Key Exchange with the Help of a Public Ledger -- Reconciling Multiple Objectives - Politics or Markets? -- The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations -- A Security Perspective on Publication Metrics -- Controlling Your Neighbors Bandwidth for Fun and Profit -- Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come -- Security from Disjoint Paths: Is It Possible? -- End to End Security Is Not Enough -- Auditable PAKEs: Approaching Fair Exchange Without a TTP. | |
520 | _aThis book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aApplication software. _9167287 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9167288 |
700 | 1 |
_aStajano, Frank. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9167289 |
|
700 | 1 |
_aAnderson, Jonathan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9167290 |
|
700 | 1 |
_aChristianson, Bruce. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9167291 |
|
700 | 1 |
_aMatyáš, Vashek. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9167292 |
|
710 | 2 |
_aSpringerLink (Online service) _9167293 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319710747 |
776 | 0 | 8 |
_iPrinted edition: _z9783319710761 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10476 _9167294 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-71075-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96546 _d96546 |