Advertisement

Security Protocols XXII

22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers

  • Bruce Christianson
  • James Malcolm
  • Vashek Matyáš
  • Petr Švenda
  • Frank Stajano
  • Jonathan Anderson
Conference proceedings Security Protocols 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)

Also part of the Security and Cryptology book sub series (LNSC, volume 8809)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Dieter Gollmann
    Pages 1-8
  3. Olgierd Pieczul, Simon N. Foley
    Pages 18-27
  4. Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
    Pages 38-48
  5. Vit Bukac, Vaclav Lorenc, Vashek Matyáš
    Pages 55-61
  6. Daniel R. Thomas, Alastair R. Beresford
    Pages 130-145
  7. Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W. Moore et al.
    Pages 154-162
  8. Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington
    Pages 172-186
  9. Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano
    Pages 197-215
  10. Henry Tan, Micah Sherr
    Pages 221-226
  11. Joan Feigenbaum, Jérémie Koenig
    Pages 239-252
  12. Aaron D. Jaggard, Rebecca N. Wright
    Pages 263-267
  13. Filip Jurnečka, Martin Stehlík, Vashek Matyáš
    Pages 300-315
  14. Partha Das Chowdhury, Bruce Christianson
    Pages 340-344
  15. Partha Das Chowdhury
    Pages 345-349
  16. Joseph Bonneau, Andrew Miller
    Pages 350-358
  17. Back Matter
    Pages 371-373

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014.
The volume contains 36 revised papers with transcripts of the presentation and workshop discussion and an introduction. The theme of this year's workshop is "Collaborating with the Enemy".

Keywords

Anonymity Attack mitigation Authentication Critical infrastructures Cryptography Electronic voting Honeypot One time token Passwords Privacy Public-key cryptography Security analysis Security protocols Verifiability Web authentication

Editors and affiliations

  • Bruce Christianson
    • 1
  • James Malcolm
    • 2
  • Vashek Matyáš
    • 3
  • Petr Švenda
    • 4
  • Frank Stajano
    • 5
  • Jonathan Anderson
    • 6
  1. 1.University of HertfordshireHertfordshireUnited Kingdom
  2. 2.University of HertfordshireHertfordshireUnited Kingdom
  3. 3.Masaryk University Faculty of InformaticsBrnoCzech Republic
  4. 4.Masaryk University Faculty of InformaticsBrnoCzech Republic
  5. 5.University of CambridgeCambridgeUnited Kingdom
  6. 6.Memorial University of NewfoundlandSt. John'sCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-12400-1
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-12399-8
  • Online ISBN 978-3-319-12400-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site