did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540771555

Security Protocols

by ; ; ;
  • ISBN13:

    9783540771555

  • ISBN10:

    3540771557

  • Format: Paperback
  • Copyright: 2008-02-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.99 Save up to $71.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. There are 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, and access control.

Table of Contents

The System Likes You (Transcript of Discussion)p. 1
Experiences with Host-to-Host IPsecp. 3
Discussionp. 23
Repairing the Bluetooth Pairing Protocolp. 31
Discussionp. 46
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tagsp. 51
Discussionp. 60
PIN (and Chip) or Signature: Beating the Cheating?p. 69
Discussionp. 76
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)p. 82
Discussionp. 89
Authorisation Subterfuge by Delegation in Decentralised Networksp. 97
Discussionp. 103
Multi-channel Protocolsp. 112
Discussionp. 128
Combining Crypto with Biometrics: A New Human-Security Interface (Transcript of Discussion)p. 133
User-Friendly Grid Security Architecture and Protocolsp. 139
Discussionp. 157
Countering Automated Exploits with System Security CAPTCHASp. 162
Discussionp. 170
The System Likes You? (Transcript of Discussion)p. 180
Enhancing Privacy with Shared Pseudo Random Sequencesp. 187
Discussionp. 197
Non-repudiation and the Metaphysics of Presence (Extended Abstract)p. 204
Discussionp. 207
Understanding Why Some Network Protocols Are User-Unfriendlyp. 215
Discussionp. 220
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computerp. 228
Discussionp. 238
Listen Too Closely and You May Be Confusedp. 245
Discussionp. 250
The Dining Freemasons (Security Protocols for Secret Societies)p. 258
Discussionp. 266
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) (Transcript of Discussion)p. 276
Safer Scripting Through Precompilationp. 284
Discussionp. 289
Implementing a Multi-hat PDAp. 295
Discussionp. 308
Anonymous Context Based Role Activation Mechanismp. 315
Discussionp. 322
Topology of Covert Conflict (Transcript of Discussion)p. 329
The Initial Costs and Maintenance Costs of Protocolsp. 333
Discussionp. 336
Alice and Bobp. 344
Author Indexp. 347
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program