Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was “Remodelling the Attacker” with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn’t the attacker’s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Author(s): Bruce Christianson (auth.), Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe (eds.)
Series: Lecture Notes in Computer Science 6615 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 257
Tags: Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Operating Systems; Information Systems Applications (incl.Internet); Legal Aspects of Computing

Front Matter....Pages -
Remodelling the Attacker (Transcript of Discussion)....Pages 1-2
Fighting the ‘Good’ Internet War....Pages 3-11
Security Protocol Deployment Risk....Pages 12-20
Security Protocol Deployment Risk (Transcript of Discussion)....Pages 21-24
Do Not Model the Attacker....Pages 25-35
Do Not Model the Attacker (Transcript of Discussion)....Pages 36-37
Generating Random Numbers in Hostile Environments....Pages 38-50
Generating Random Numbers in Hostile Environments (Transcript of Discussion)....Pages 51-53
Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters....Pages 54-70
Cyberdice (Transcript of Discussion)....Pages 71-83
Problems with Same Origin Policy....Pages 84-85
Problems with Same Origin Policy (Transcript of Discussion)....Pages 86-92
Hardened Stateless Session Cookies....Pages 93-101
Hardened Stateless Session Cookies (Transcript of Discussion)....Pages 102-106
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing....Pages 107-114
TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion)....Pages 115-117
Handling New Adversaries in Wireless Ad-Hoc Networks....Pages 118-119
Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion)....Pages 120-125
Problems of Provenance for Digital Libraries....Pages 126-133
Problems of Provenance for Digital Libraries (Transcript of Discussion)....Pages 134-143
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols....Pages 144-155
Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion)....Pages 156-158
Password Authenticated Key Exchange by Juggling....Pages 159-171
Password Authenticated Key Exchange by Juggling (Transcript of Discussion)....Pages 172-179
A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)....Pages 180-190
A Real World Application of Secure Multi-party Computations (Transcript of Discussion)....Pages 191-197
Covert Communications Despite Traffic Data Retention....Pages 198-214
Covert Communications Despite Traffic Data Retention (Transcript of Discussion)....Pages 215-219
What Next after Anonymity?....Pages 220-222
What Next After Anonymity? (Transcript of Discussion)....Pages 223-231
Remodelling the Attacker in Voting Protocols....Pages 232-234
Remodelling the Attacker in Voting Protocols (Transcript of Discussion)....Pages 235-240
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting....Pages 241-243
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion)....Pages 244-255
Back Matter....Pages -