Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2011
Schriftenreihe:Lecture notes in computer science 7114
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV039753584
003 DE-604
005 20150113
007 t|
008 111212s2011 gw d||| |||| 10||| eng d
015 |a 11,N46  |2 dnb 
016 7 |a 1016907567  |2 DE-101 
020 |a 3642258662  |9 3-642-25866-2 
020 |a 9783642258664  |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)  |9 978-3-642-25866-4 
024 3 |a 9783642258664 
028 5 2 |a Best.-Nr.: 86019831 
035 |a (OCoLC)769469284 
035 |a (DE-599)DNB1016907567 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-706  |a DE-91G  |a DE-83  |a DE-11 
082 0 |a 005.8  |2 23 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
084 |a DAT 461f  |2 stub 
084 |a DAT 465f  |2 stub 
245 1 0 |a Security protocols XIX  |b 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers  |c Bruce Christianson ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2011 
300 |a IX, 380 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7114 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a RFID  |0 (DE-588)4509863-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Trusted Computing  |0 (DE-588)7562931-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2011  |z Cambridge  |2 gnd-content 
689 0 0 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 0 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 0 2 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 0 3 |a RFID  |0 (DE-588)4509863-3  |D s 
689 0 4 |a Trusted Computing  |0 (DE-588)7562931-8  |D s 
689 0 5 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 |5 DE-604 
700 1 |a Christianson, Bruce  |d 1958-  |e Sonstige  |0 (DE-588)1064909507  |4 oth 
711 2 |a International Security Protocols Workshop  |n 19  |d 2011  |c Cambridge  |j Sonstige  |0 (DE-588)16332995-3  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-25867-1 
830 0 |a Lecture notes in computer science  |v 7114  |w (DE-604)BV000000607  |9 7114 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024614935&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024614935 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1806443
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040071394853
_version_ 1820801068581257216
adam_text IMAGE 1 TABLE OF CONTENTS INTRODUCTION: ALICE DOESN T LIVE HERE ANYMORE (TRANSCRIPT) 1 BRUCE CHRISTIANSON HIS LATE MASTER S VOICE: BARKING FOR LOCATION PRIVACY 4 MIKE BURMESTER HIS LATE MASTER S VOICE (TRANSCRIPT OF DISCUSSION) 15 MIKE BURMESTER CAN WE FIX THE SECURITY ECONOMICS OF FEDERATED AUTHENTICATION? 25 ROSS ANDERSON CAN WE FIX THE SECURITY ECONOMICS OF FEDERATED AUTHENTICATION? (TRANSCRIPT OF DISCUSSION) 33 ROSS ANDERSON PICO: NO MORE PASSWORDS! 49 FRANK STAJANO PICO: NO MORE PASSWORDS! (TRANSCRIPT OF DISCUSSION) 82 FRANK STAJANO GETTING WEB AUTHENTICATION RIGHT: A BEST-CASE PROTOCOL FOR THE REMAINING LIFE OF PASSWORDS 98 JOSEPH BONNEAU GETTING WEB AUTHENTICATION RIGHT (TRANSCRIPT OF DISCUSSION) 105 JOSEPH BONNEAU WHEN CONTEXT IS BETTER THAN IDENTITY: AUTHENTICATION BY CONTEXT USING EMPIRICAL CHANNELS 115 BANGDAO CHEN, LONG HOANG NGUYEN, AND ANDREW WILLIAM ROSCOE WHEN CONTEXT IS BETTER THAN IDENTITY (TRANSCRIPT OF DISCUSSION) 126 BANGDAO CHEN SELECTIVE LOCATION BLINDING USING HASH CHAINS 132 GABRIELE LENZINI, SJOUKE MAUW, AND JUN PANG SELECTIVE LOCATION BLINDING USING HASH CHAINS (TRANSCRIPT OF DISCUSSION) 142 SJOUKE MAUW BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016907567 DIGITALISIERT DURCH IMAGE 2 VIII TABLE OF CONTENTS RISKS OF BLIND CONTROLLERS AND DEAF VIEWS IN MODEL VIEW CONTROLLER PATTERNS FOR MULTITAG USER INTERFACES 150 ALF ZUGENMAIER RISK OF BLIND CONTROLLER PATTERNS FOR MULTITAG USER INTERFACES (TRANSCRIPT OF DISCUSSION) 156 ALF ZUGENMAIER HOW TO SYNC WITH ALICE 170 FENG HAO AND PETER Y.A. RYAN HOW TO SYNC WITH ALICE (TRANSCRIPT OF DISCUSSION) 179 FENG HAO ATTACK DETECTION VS. PRIVACY - HOW TO FIND THE LINK OR HOW TO HIDE IT? 189 JIFI KUER, VASHEK MATYAS, ANDRIY STETSKO, AND PETR SVENDA ATTACK DETECTION VS PRIVACY - HOW TO FIND THE LINK OR HOW TO HIDE IT (TRANSCRIPT OF DISCUSSION) 200 JIFI KVX AND ANDRIY STETSKO THE SENSE OF SECURITY AND A COUNTERMEASURE FOR THE FALSE SENSE 205 YUKO MURAYAMA, YASUHIRO FUJIHARA, AND DAI NISHIOKA THE SENSE OF SECURITY AND A COUNTERMEASURE FOR THE FALSE SENSE (TRANSCRIPT OF DISCUSSION) 215 JAMES MALCOLM TOWARDS A THEORY OF TRUST IN NETWORKS OF HUMANS AND COMPUTERS 223 VIRGIL GLIGOR AND JEANNETTE M. WING TOWARDS A THEORY OF TRUST IN NETWORKS OF HUMANS AND COMPUTERS (TRANSCRIPT OF DISCUSSION) 243 VIRGIL GLIGOR GEARING UP: HOW TO EAT YOUR CRYPTOCAKE AND STILL HAVE IT 258 ALEX SHAFARENKO AND BRUCE CHRISTIANSON GEARING UP: HOW TO EAT YOUR CRYPTOCAKE AND STILL HAVE IT (TRANSCRIPT OF DISCUSSION) 260 ALEX SHAFARENKO MAKE NOISE AND WHISPER: A SOLUTION TO RELAY ATTACKS 271 OMAR CHOUDARY AND FRANK STAJANO MAKE NOISE AND WHISPER: A SOLUTION TO RELAY ATTACKS (TRANSCRIPT OF DISCUSSION) 284 OMAR CHOUDARY IMAGE 3 TABLE OF CONTENTS IX SCRAMBLING FOR LIGHTWEIGHT CENSORSHIP RESISTANCE 296 JOSEPH BONNEAU AND RUBIN XU SCRAMBLING FOR LIGHTWEIGHT CENSORSHIP RESISTANCE (TRANSCRIPT OF DISCUSSION) 303 RUBIN XU THE METAPLACE SECURITY MODEL 313 MICHAEL ROE THE METAPLACE SECURITY MODEL (TRANSCRIPT OF DISCUSSION) 327 MICHAEL ROE ONE-WAY CRYPTOGRAPHY 336 SANDY CLARK, TRAVIS GOODSPEED, PERRY METZGER, ZACHARY WASSERMAN, KEVIN XU, AND MATT BLAZE ONE-WAY CRYPTOGRAPHY (TRANSCRIPT OF DISCUSSION) 341 MATT BLAZE HOW TO KEEP BAD PAPERS OUT OF CONFERENCES (WITH MINIMUM REVIEWER EFFORT) 359 JONATHAN ANDERSON, FRANK STAJANO, AND ROBERT N.M. WATSON HOW TO KEEP BAD PAPERS OUT OF CONFERENCES (TRANSCRIPT OF DISCUSSION) 368 JONATHAN ANDERSON POSTSCRIPT: ALICE REFLECTS UPON THE STATE OF THE ART IN SECURITY PROTOCOL DESIGN 381 AUTHOR INDEX 383
any_adam_object 1
author_GND (DE-588)1064909507
building Verbundindex
bvnumber BV039753584
classification_rvk SS 4800
classification_tum DAT 461f
DAT 465f
ctrlnum (OCoLC)769469284
(DE-599)DNB1016907567
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02823nam a2200625 cb4500</leader><controlfield tag="001">BV039753584</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">111212s2011 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N46</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016907567</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642258662</subfield><subfield code="9">3-642-25866-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642258664</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-25866-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642258664</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86019831</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)769469284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016907567</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols XIX</subfield><subfield code="b">19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers</subfield><subfield code="c">Bruce Christianson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 380 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7114</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Security Protocols Workshop</subfield><subfield code="n">19</subfield><subfield code="d">2011</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16332995-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-25867-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7114</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7114</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024614935&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024614935</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2011 Cambridge gnd-content
genre_facet Konferenzschrift 2011 Cambridge
id DE-604.BV039753584
illustrated Illustrated
indexdate 2024-12-24T02:28:56Z
institution BVB
institution_GND (DE-588)16332995-3
isbn 3642258662
9783642258664
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024614935
oclc_num 769469284
open_access_boolean
owner DE-706
DE-91G
DE-BY-TUM
DE-83
DE-11
owner_facet DE-706
DE-91G
DE-BY-TUM
DE-83
DE-11
physical IX, 380 S. graph. Darst.
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers
Lecture notes in computer science
Authentifikation (DE-588)4330656-1 gnd
RFID (DE-588)4509863-3 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Trusted Computing (DE-588)7562931-8 gnd
Privatsphäre (DE-588)4123980-5 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
subject_GND (DE-588)4330656-1
(DE-588)4509863-3
(DE-588)4709127-7
(DE-588)7562931-8
(DE-588)4123980-5
(DE-588)4830502-9
(DE-588)1071861417
title Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers
title_auth Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers
title_exact_search Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers
title_full Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.)
title_fullStr Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.)
title_full_unstemmed Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.)
title_short Security protocols XIX
title_sort security protocols xix 19th international workshop cambridge uk march 28 30 2011 revised selected papers
title_sub 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers
topic Authentifikation (DE-588)4330656-1 gnd
RFID (DE-588)4509863-3 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Trusted Computing (DE-588)7562931-8 gnd
Privatsphäre (DE-588)4123980-5 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
topic_facet Authentifikation
RFID
Sicherheitsprotokoll
Trusted Computing
Privatsphäre
Kryptoanalyse
Konferenzschrift 2011 Cambridge
url http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024614935&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT christiansonbruce securityprotocolsxix19thinternationalworkshopcambridgeukmarch28302011revisedselectedpapers
AT internationalsecurityprotocolsworkshopcambridge securityprotocolsxix19thinternationalworkshopcambridgeukmarch28302011revisedselectedpapers