Skip to main content
  • Conference proceedings
  • © 2017

Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10476)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2017.

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-71075-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 54.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Front Matter

    Pages I-XI
  2. Multiple Objectives of Lawful-Surveillance Protocols

    • Joan Feigenbaum, Bryan Ford
    Pages 1-8
  3. Assuring the Safety of Asymmetric Social Protocols

    • Virgil Gligor, Frank Stajano
    Pages 38-48
  4. Simulating Perceptions of Security

    • Paul Wernick, Bruce Christianson, Joseph Spring
    Pages 60-68
  5. Self Attestation of Things

    • Partha Das Chowdhury, Bruce Christianson
    Pages 76-84
  6. Making Decryption Accountable

    • Mark D. Ryan
    Pages 93-98
  7. Key Exchange with the Help of a Public Ledger

    • Thanh Bui, Tuomas Aura
    Pages 123-136
  8. Reconciling Multiple Objectives – Politics or Markets?

    • Ross Anderson, Khaled Baqer
    Pages 144-156
  9. The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations

    • Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams
    Pages 171-179

Other Volumes

  1. Security Protocols XXV

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.

The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions.  The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security.

Keywords

  • security and privacy
  • formal methods
  • theory of security
  • systems security
  • network security
  • software and application security
  • security protocols
  • web protocol security
  • mobile and wireless security
  • authentication
  • cryptography
  • computer crime
  • internet
  • encryption
  • public key cryptography

Editors and Affiliations

  • University of Cambridge, Cambridge, United Kingdom

    Frank Stajano

  • Memorial University of Newfoundland, St. John’s, Canada

    Jonathan Anderson

  • University of Hertfordshire, Hatfield, United Kingdom

    Bruce Christianson

  • Masaryk University, Brno, Czech Republic

    Vashek Matyáš

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-71075-4
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 54.99
Price excludes VAT (USA)