Advertisement

Security Protocols XXIII

23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers

  • Bruce Christianson
  • Petr Švenda
  • Vashek Matyáš
  • James Malcolm
  • Frank Stajano
  • Jonathan Anderson
Conference proceedings Security Protocols 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9379)

Also part of the Security and Cryptology book sub series (LNSC, volume 9379)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Olgierd Pieczul, Simon N. Foley
    Pages 1-11
  3. Simon N. Foley, Olgierd Pieczul
    Pages 12-21
  4. Saša Radomirović, Mohammad Torabi Dashti
    Pages 41-46
  5. Mohammad Torabi Dashti
    Pages 47-49
  6. Yanlin Li, Yueqiang Cheng, Virgil Gligor, Adrian Perrig
    Pages 50-68
  7. Hugo Jonker, Sjouke Mauw, Saša Radomirović
    Pages 105-115
  8. Daniel R. Thomas, Alastair R. Beresford, Thomas Coudray, Tom Sutcliffe, Adrian Taylor
    Pages 126-138
  9. Vit Bukac, Radim Ostadal, Petr Svenda, Tatevik Baghdasaryan, Vashek Matyas
    Pages 145-151
  10. Jiangshan Yu, Mark D. Ryan
    Pages 158-167
  11. Sandy Clark, Matt Blaze, Jonathan M. Smith
    Pages 178-182
  12. Frank Stajano, Bruce Christianson, Mark Lomas, Graeme Jenkinson, Jeunese Payne, Max Spencer et al.
    Pages 195-211
  13. Khaled Baqer, Ross Anderson
    Pages 224-236
  14. Giampaolo Bella, Luca Viganò
    Pages 247-250
  15. Joan Feigenbaum, Brad Rosen
    Pages 261-275
  16. Syed Taha Ali, Dylan Clarke, Patrick McCorry
    Pages 283-293
  17. Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan
    Pages 325-341
  18. Back Matter
    Pages 365-367

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".

Keywords

adversary anonymity attack mitigation authentication Bitcoin cryptographic protocols cryptography information security location privacy network security public-key cryptography security analysis security engineering security protocols trusted computing

Editors and affiliations

  • Bruce Christianson
    • 1
  • Petr Švenda
    • 2
  • Vashek Matyáš
    • 3
  • James Malcolm
    • 4
  • Frank Stajano
    • 5
  • Jonathan Anderson
    • 6
  1. 1.University of HertfordshireHatfieldUnited Kingdom
  2. 2.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic
  3. 3.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic
  4. 4.University of HertfordshireHatfieldUnited Kingdom
  5. 5.University of CambridgeCambridgeUnited Kingdom
  6. 6.Memorial University of NewfoundlandSt. John'sCanada

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-26096-9
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26095-2
  • Online ISBN 978-3-319-26096-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site