001482570 000__ 04625cam\\2200769\i\4500 001482570 001__ 1482570 001482570 003__ OCoLC 001482570 005__ 20231128003341.0 001482570 006__ m\\\\\o\\d\\\\\\\\ 001482570 007__ cr\cn\nnnunnun 001482570 008__ 231023s2023\\\\sz\a\\\\o\\\\\101\0\eng\d 001482570 020__ $$a9783031430336$$q(electronic bk.) 001482570 020__ $$a3031430336$$q(electronic bk.) 001482570 020__ $$z9783031430329 001482570 0247_ $$a10.1007/978-3-031-43033-6$$2doi 001482570 035__ $$aSP(OCoLC)1405436188 001482570 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCO$$dOCLCF 001482570 049__ $$aISEA 001482570 050_4 $$aQA76.9.A25 001482570 08204 $$a005.8$$223/eng/20231023 001482570 1112_ $$aInternational Workshop on Security Protocols$$n(28th :$$d2023 :$$cCambridge, England) 001482570 24510 $$aSecurity protocols XXVIII :$$b28th international workshop, Cambridge, UK, March 27-28, 2023, revised selected papers /$$cFrank Stajano, Vashek Matyáš, Bruce Christianson, Jonathan Anderson, editors. 001482570 264_1 $$aCham :$$bSpringer,$$c[2023] 001482570 264_4 $$c©2023 001482570 300__ $$a1 online resource (xi, 271 pages) :$$billustrations (chiefly color). 001482570 336__ $$atext$$btxt$$2rdacontent 001482570 337__ $$acomputer$$bc$$2rdamedia 001482570 338__ $$aonline resource$$bcr$$2rdacarrier 001482570 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v14186 001482570 500__ $$aSelected conference proceedings. 001482570 500__ $$aIncludes author index. 001482570 5050_ $$aSleepwalking into Disaster? Requirements Engineering for Digital Cash -- Transporting a Secret Using Destructively-Read Memory -- Authentication of IT Professionals in the Wild - A Survey -- Incentives and Censorship Resistance for Mixnets Revisited -- Can’t Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices -- Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches -- Trusted Introductions for Secure Messaging -- Choosing Your Friends: Shaping Ethical Use of Anonymity Networks -- One Protocol to Rule them All? On Securing Interoperable Messaging -- If it’s Provably Secure, it Probably isn’t: Why Learning from Proof Failure is Hard -- Towards Human-Centric Endpoint Security -- Determining an Economic Value of High Assurance for Commodity Software Security -- Blind Auditing and Probabilistic Access Controls. 001482570 506__ $$aAccess limited to authorized users. 001482570 520__ $$aThis book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27–28, 2023. Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was “Humans in security protocols — are we learning from mistakes?” The topics covered are securing the human endpoint and proving humans correct. 001482570 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 23, 2023). 001482570 650_6 $$aSécurité informatique$$vCongrès. 001482570 650_6 $$aProtection de l'information (Informatique)$$vCongrès. 001482570 650_6 $$aRéseaux d'ordinateurs$$vCongrès. 001482570 650_6 $$aLogiciels d'application$$vCongrès. 001482570 650_6 $$aGénie logiciel$$vCongrès. 001482570 650_6 $$aInterfaces utilisateurs (Informatique)$$vCongrès. 001482570 650_6 $$aOrdinateurs et civilisation$$vCongrès. 001482570 650_0 $$aComputer security$$vCongresses. 001482570 650_0 $$aData protection$$vCongresses.$$vCongresses$$0(DLC)sh2008102034 001482570 650_0 $$aComputer networks$$vCongresses. 001482570 650_0 $$aApplication software$$vCongresses. 001482570 650_0 $$aSoftware engineering$$vCongresses.$$vCongresses$$0(DLC)sh2008111658 001482570 650_0 $$aUser interfaces (Computer systems)$$vCongresses. 001482570 650_0 $$aComputers and civilization$$vCongresses.$$vCongresses$$0(DLC)sh2009120889 001482570 655_0 $$aElectronic books. 001482570 655_7 $$aproceedings (reports)$$2aat 001482570 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001482570 655_7 $$aConference papers and proceedings.$$2lcgft 001482570 655_7 $$aActes de congrès.$$2rvmgf 001482570 7001_ $$aStajano, Frank,$$eeditor.$$0(DLC)n 2001014069 001482570 7001_ $$aMatyás̆, Vashek,$$eeditor.$$0(OCoLC)oca08557910 001482570 7001_ $$aChristianson, Bruce,$$eeditor.$$0(DLC)n 98070906 001482570 7001_ $$aAnderson, Jonathan$$c(Computer scientist),$$eeditor.$$d1939-$$0(OCoLC)oca00057343 001482570 830_0 $$aLecture notes in computer science ;$$v14186.$$x1611-3349 001482570 852__ $$bebk 001482570 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-43033-6$$zOnline Access$$91397441.1 001482570 909CO $$ooai:library.usi.edu:1482570$$pGLOBAL_SET 001482570 980__ $$aBIB 001482570 980__ $$aEBOOK 001482570 982__ $$aEbook 001482570 983__ $$aOnline 001482570 994__ $$a92$$bISE