Coverart for item
The Resource Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, Bruce Christianson, James Malcolm (eds.)

Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, Bruce Christianson, James Malcolm (eds.)

Label
Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
Title
Security protocols XVIII
Title remainder
18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
Statement of responsibility
Bruce Christianson, James Malcolm (eds.)
Title variation
Security protocols 18
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security"
Member of
Cataloging source
DKDLA
Dewey number
005.8
Illustrations
illustrations
Index
no index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2010
http://bibfra.me/vocab/lite/meetingName
International Workshop on Security Protocols
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Christianson, Bruce
  • Malcolm, James
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7061
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Computer science
  • Computer networks
  • Data protection
  • Data encryption (Computer science)
  • Computer software
  • Computer networks
  • Computer networks
  • Computer science
  • Computer security
  • Computer software
  • Data encryption (Computer science)
  • Data protection
Label
Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, Bruce Christianson, James Malcolm (eds.)
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Introduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It's the Anthropology, Stupid! -- It's the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation
Control code
902703757
Extent
1 online resource (XII, 267 pages)
Form of item
online
Isbn
9783662459201
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-662-45921-8
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)902703757
Label
Security protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers, Bruce Christianson, James Malcolm (eds.)
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Introduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze of Security Standards -- Caught in the Maze of Security Standards (Transcript of Discussion) -- Blood in the Water: Are There Honeymoon Effects Outside Software? -- Blood in the Water (Transcript of Discussion) -- Digital Immolation: New Directions for Online Protest -- Digital Immolation (Transcript of Discussion) -- Relay-Proof Channels Using UWB Lasers -- Relay-Proof Channels Using UWB Lasers (Transcript of Discussion) -- Using Dust Clouds to Enhance Anonymous Communication -- Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion) -- Generating Channel Ids in Virtual World Operating Systems (Extended Abstract) -- Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion) -- Censorship-Resilient Communications through Information Scattering -- Censorship-Resilient Communications through Information Scattering (Transcript of Discussion) -- On Storing Private Keys in the Cloud -- On Storing Private Keys in the Cloud (Transcript of Discussion) -- More Security or Less Insecurity -- More Security or Less Insecurity (Transcript of Discussion) -- It's the Anthropology, Stupid! -- It's the Anthropology, Stupid! (Transcript of Discussion) -- Security Design in Human Computation Games -- Security Design in Human Computation Games (Transcript of Discussion) -- Virtually Perfect Democracy -- Virtually Perfect Democracy (Transcript of Discussion) -- Security Protocols for Secret Santa -- Security Protocols for Secret Santa (Transcript of Discussion) -- Censorship of eBooks (Extended Abstract) -- Censorship of eBooks (Transcript of Discussion) -- On the Value of Hybrid Security Testing -- On the Value of Hybrid Security Testing (Transcript of Discussion) -- Security Made, Not Perfect, But Automatic -- Security Made, Not Perfect, But Automatic (Transcript of Discussion) -- Security Limitations of Virtualization and How to Overcome Them -- Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) -- Recapitulation
Control code
902703757
Extent
1 online resource (XII, 267 pages)
Form of item
online
Isbn
9783662459201
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-662-45921-8
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)902703757

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...