Security protocols XXVIII : 28th international workshop, Cambridge, UK, March 27-28, 2023, revised selected papers / Frank Stajano, Vashek Matyáš, Bruce Christianson, Jonathan Anderson, editors.
2023
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security protocols XXVIII : 28th international workshop, Cambridge, UK, March 27-28, 2023, revised selected papers / Frank Stajano, Vashek Matyáš, Bruce Christianson, Jonathan Anderson, editors.
ISBN
9783031430336 (electronic bk.)
3031430336 (electronic bk.)
9783031430329
3031430336 (electronic bk.)
9783031430329
Published
Cham : Springer, [2023]
Copyright
©2023
Language
English
Description
1 online resource (xi, 271 pages) : illustrations (chiefly color).
Item Number
10.1007/978-3-031-43033-6 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27–28, 2023. Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was “Humans in security protocols — are we learning from mistakes?” The topics covered are securing the human endpoint and proving humans correct.
Note
Selected conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed October 23, 2023).
Added Author
Series
Lecture notes in computer science ; 14186. 1611-3349
Linked Resources
Record Appears in
Table of Contents
Sleepwalking into Disaster? Requirements Engineering for Digital Cash
Transporting a Secret Using Destructively-Read Memory
Authentication of IT Professionals in the Wild - A Survey
Incentives and Censorship Resistance for Mixnets Revisited
Can’t Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices
Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches
Trusted Introductions for Secure Messaging
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks
One Protocol to Rule them All? On Securing Interoperable Messaging
If it’s Provably Secure, it Probably isn’t: Why Learning from Proof Failure is Hard
Towards Human-Centric Endpoint Security
Determining an Economic Value of High Assurance for Commodity Software Security
Blind Auditing and Probabilistic Access Controls.
Transporting a Secret Using Destructively-Read Memory
Authentication of IT Professionals in the Wild - A Survey
Incentives and Censorship Resistance for Mixnets Revisited
Can’t Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices
Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches
Trusted Introductions for Secure Messaging
Choosing Your Friends: Shaping Ethical Use of Anonymity Networks
One Protocol to Rule them All? On Securing Interoperable Messaging
If it’s Provably Secure, it Probably isn’t: Why Learning from Proof Failure is Hard
Towards Human-Centric Endpoint Security
Determining an Economic Value of High Assurance for Commodity Software Security
Blind Auditing and Probabilistic Access Controls.