03683nam 22007095 450 991051215970332120251225174925.03-030-91859-910.1007/978-3-030-91859-0(CKB)5100000000152661(MiAaPQ)EBC6858144(Au-PeEL)EBL6858144(PPN)259384925(BIP)82455023(BIP)82050747(DE-He213)978-3-030-91859-0(EXLCZ)99510000000015266120211203d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity and Trust Management 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings /edited by Rodrigo Roman, Jianying Zhou1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (208 pages)Security and Cryptology,2946-1863 ;130753-030-91858-0 Applied Cryptography -- An Aggregate Signature with Pre-Communication in the Plain Public Key Model -- The Adversary Capabilities In Practical Byzantine Fault Tolerance -- Privacy -- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services -- Efficient permutation protocol for MPC in the head -- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78 -- Formal Methods for Security and Trust -- Secure Implementation of a Quantum-Future GAKE Protocol -- Deciding a Fragment of (alpha, beta)-Privacy -- Systems Security -- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT -- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols -- Towards Decentralized and Provably Secure Cross-Domain Solutions.This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on October 8, 2021, due to the COVID-19 pandemic. The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security. .Security and Cryptology,2946-1863 ;13075Data protectionApplication softwareComputer engineeringComputer networksCryptographyData encryption (Computer science)Data and Information SecurityComputer and Information Systems ApplicationsComputer Engineering and NetworksCryptologyData protection.Application software.Computer engineering.Computer networks.Cryptography.Data encryption (Computer science)Data and Information Security.Computer and Information Systems Applications.Computer Engineering and Networks.Cryptology.005.8Roman RodrigoZhou JianyingMiAaPQMiAaPQMiAaPQBOOK9910512159703321Security and Trust Management3590338UNINA