Security Protocols

by ; ; ;
Format: Paperback
Pub. Date: 2008-02-01
Publisher(s): Springer-Verlag New York Inc
List Price: $97.23

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$19.80
Online:60 Days access
Downloadable:60 Days
$26.40
Online:90 Days access
Downloadable:90 Days
$33.00
Online:120 Days access
Downloadable:120 Days
$39.60
Online:180 Days access
Downloadable:180 Days
$42.90
Online:1825 Days access
Downloadable:Lifetime Access
$65.99
*To support the delivery of the digital material to you, a non-refundable digital delivery fee of $3.99 will be charged on each digital item.
$42.90*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. There are 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, and access control.

Table of Contents

The System Likes You (Transcript of Discussion)p. 1
Experiences with Host-to-Host IPsecp. 3
Discussionp. 23
Repairing the Bluetooth Pairing Protocolp. 31
Discussionp. 46
Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tagsp. 51
Discussionp. 60
PIN (and Chip) or Signature: Beating the Cheating?p. 69
Discussionp. 76
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)p. 82
Discussionp. 89
Authorisation Subterfuge by Delegation in Decentralised Networksp. 97
Discussionp. 103
Multi-channel Protocolsp. 112
Discussionp. 128
Combining Crypto with Biometrics: A New Human-Security Interface (Transcript of Discussion)p. 133
User-Friendly Grid Security Architecture and Protocolsp. 139
Discussionp. 157
Countering Automated Exploits with System Security CAPTCHASp. 162
Discussionp. 170
The System Likes You? (Transcript of Discussion)p. 180
Enhancing Privacy with Shared Pseudo Random Sequencesp. 187
Discussionp. 197
Non-repudiation and the Metaphysics of Presence (Extended Abstract)p. 204
Discussionp. 207
Understanding Why Some Network Protocols Are User-Unfriendlyp. 215
Discussionp. 220
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computerp. 228
Discussionp. 238
Listen Too Closely and You May Be Confusedp. 245
Discussionp. 250
The Dining Freemasons (Security Protocols for Secret Societies)p. 258
Discussionp. 266
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) (Transcript of Discussion)p. 276
Safer Scripting Through Precompilationp. 284
Discussionp. 289
Implementing a Multi-hat PDAp. 295
Discussionp. 308
Anonymous Context Based Role Activation Mechanismp. 315
Discussionp. 322
Topology of Covert Conflict (Transcript of Discussion)p. 329
The Initial Costs and Maintenance Costs of Protocolsp. 333
Discussionp. 336
Alice and Bobp. 344
Author Indexp. 347
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.