LEADER 03684nam 22007095 450 001 9910512159703321 005 20251225174925.0 010 $a3-030-91859-9 024 7 $a10.1007/978-3-030-91859-0 035 $a(CKB)5100000000152661 035 $a(MiAaPQ)EBC6858144 035 $a(Au-PeEL)EBL6858144 035 $a(PPN)259384925 035 $a(BIP)82455023 035 $a(BIP)82050747 035 $a(DE-He213)978-3-030-91859-0 035 $a(EXLCZ)995100000000152661 100 $a20211203d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Trust Management $e17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings /$fedited by Rodrigo Roman, Jianying Zhou 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (208 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v13075 311 08$a3-030-91858-0 327 $aApplied Cryptography -- An Aggregate Signature with Pre-Communication in the Plain Public Key Model -- The Adversary Capabilities In Practical Byzantine Fault Tolerance -- Privacy -- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services -- Efficient permutation protocol for MPC in the head -- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78 -- Formal Methods for Security and Trust -- Secure Implementation of a Quantum-Future GAKE Protocol -- Deciding a Fragment of (alpha, beta)-Privacy -- Systems Security -- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT -- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols -- Towards Decentralized and Provably Secure Cross-Domain Solutions. 330 $aThis book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on October 8, 2021, due to the COVID-19 pandemic. The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security. . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v13075 606 $aData protection 606 $aApplication software 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputer Engineering and Networks 606 $aCryptology 615 0$aData protection. 615 0$aApplication software. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 676 $a005.8 702 $aRoman$b Rodrigo 702 $aZhou$b Jianying 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910512159703321 996 $aSecurity and Trust Management$93590338 997 $aUNINA