LEADER 08608nam 22009015 450 001 996466000503316 005 20211221180227.0 010 $a3-642-35694-X 024 7 $a10.1007/978-3-642-35694-0 035 $a(CKB)3400000000102944 035 $a(SSID)ssj0000810226 035 $a(PQKBManifestationID)11481555 035 $a(PQKBTitleCode)TC0000810226 035 $a(PQKBWorkID)10827734 035 $a(PQKB)11087154 035 $a(DE-He213)978-3-642-35694-0 035 $a(MiAaPQ)EBC6298305 035 $a(MiAaPQ)EBC5578470 035 $a(Au-PeEL)EBL5578470 035 $a(OCoLC)822995925 035 $a(PPN)168329158 035 $a(EXLCZ)993400000000102944 100 $a20130109d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Protocols XX$b[electronic resource] $e20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers /$fedited by Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (X, 277 p. 29 illus.) 225 1 $aSecurity and Cryptology ;$v7622 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-35693-1 320 $aIncludes bibliographical references and author index. 327 $aIntroduction: Bringing Protocols to Life (Transcript of Discussion) -- Secure Internet Voting Protocol for Overseas Military Voters -- Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion) -- Self-enforcing Electronic Voting -- Self-enforcing Electronic Voting (Transcript of Discussion) -- Approaches to Modelling Security Scenarios with Domain-Specific Languages -- Approaches to Modelling Security Scenarios with Domain-Specific Languages (Transcript of Discussion) -- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail -- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion) -- Statistical Metrics for Individual Password Strength -- Statistical Metrics for Individual Password Strength (Transcript of Discussion) -- Street-Level Trust Semantics for Attribute Authentication -- Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion) -- Analysis of Issues and Challenges of E-Voting in the UK -- Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion) -- Protocol Governance: The Elite, or the Mob? -- Protocol Governance: The Elite, or the Mob? (Transcript of Discussion) -- Usability Issues in Security -- Usability Issues in Security (Transcript of Discussion) -- Usable Privacy by Visual and Interactive Control of Information Flow -- Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion) -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion) -- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices -- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion) -- Stayin? Alive: Aliveness as an Alternative to Authentication -- Stayin? Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion) -- Paul Revere Protocols -- Paul Revere Protocols (Transcript of Discussion) -- The Last Word. Secure Internet Voting Protocol for Overseas Military Voters -- Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion) -- Self-enforcing Electronic Voting -- Self-enforcing Electronic Voting (Transcript of Discussion) -- Approaches to Modelling Security Scenarios with Domain-Specific Languages -- Approaches to Modelling Security Scenarios with Domain-Specific Languages (Transcript of Discussion) -- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail -- The Casino and the OODA Loop: Why Our Protocols Always Eventually Fail (Transcript of Discussion) -- Statistical Metrics for Individual Password Strength -- Statistical Metrics for Individual Password Strength(Transcript of Discussion) -- Street-Level Trust Semantics for Attribute Authentication -- Street-Level Trust Semantics for Attribute Authentication (Transcript of Discussion) -- Analysis of Issues and Challenges of E-Voting in the UK -- Analysis of Issues and Challenges of E-Voting in the UK (Transcript of Discussion) -- Protocol Governance: The Elite, or the Mob? -- Protocol Governance: The Elite, or the Mob? (Transcript of Discussion) -- Usability Issues in Security -- Usability Issues in Security (Transcript of Discussion) -- Usable Privacy by Visual and Interactive Control of Information Flow -- Usable Privacy by Visual and Interactive Control of Information Flow (Transcript of Discussion) -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System -- Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System (Transcript of Discussion) -- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices -- Am I in Good Company? A Privacy-Protecting Protocol for Cooperating Ubiquitous Computing Devices (Transcript of Discussion) -- Stayin? Alive: Aliveness as an Alternative to Authentication -- Stayin? Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion) -- Paul Revere Protocols -- Paul Revere Protocols (Transcript of Discussion) -- The Last Word. 330 $aThis book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life". 410 0$aSecurity and Cryptology ;$v7622 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aApplication software 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aApplication software. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputers and Society. 676 $a005.8 702 $aChristianson$b Bruce$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalcolm$b James$c(Computer scientist).$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStajano$b Frank$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAnderson$b Jonathan$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Security Protocols 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466000503316 996 $aSecurity Protocols XX$92829988 997 $aUNISA