Security protocols xxii : 22nd international workshop, cambridge, uk, march 19-21, 2014, revised selected papers / edited by Bruce Christianson, James Malcolm, Vashek Matyáš, Petr Švenda, Frank Stajano, Jonathan Anderson.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 8809Editor: Cham : Springer International Publishing : Springer, 2014Descripción: xi, 373 páginas : 40 ilustracionesTipo de contenido:- texto
- computadora
- recurso en línea
- 9783319124001
- QA76.9.A25
Springer eBooks
Preface -- Introduction: Collaborating with the Enemy (Transcript of Discussion) -- Why Bother Securing DNS? -- Why Bother Securing DNS? (Transcript of Discussion) -- Collaborating as normal: detecting systemic anomalies in your partner -- Collaborating as normal: detecting systemic anomalies in your partner (Transcript of Discussion) -- Remark!: A Secure Protocol for Remote Exams -- Remark!: A Secure Protocol for Remote Exams (Transcript of Discussion) -- Red Queen’s Race: APT win-win game -- Red Queen’s Race: APT win-win game (Transcript of Discussion) -- Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) -- Non-collaborative attackers and how and where to defend vulnerable security protocols (Transcript of Discussion) -- Dancing with the Adversary: A Tale of Wimps and Giants -- Dancing with the Adversary: a Tale of Wimps and Giants (Transcript of Discussion) -- Better authentication: password revolution by evolution -- Better authentication password revolution by evolution (Transcript of Discussion) -- Collaborating with the enemy on network management -- Collaborating with the enemy on network management (Transcript of Discussion) -- Bootstrapping Adoption of the Pico Password Replacement System -- Bootstrapping adoption of the Pico password replacement system (Transcript of Discussion) -- I Bought a New Security Token and All I Got Was This Lousy Phish — Relay Attacks on Visual Code Authentication Schemes -- Relay attacks on visual code authentication schemes (Transcript of Discussion) -- Censorship Resistance as a Side-Effect -- Censorship Resistance as a Side-Effect (Transcript of Discussion) -- On the Feasibility of a Technological Response to the Surveillance Morass -- On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion) -- Strange Bedfellows: How and When to Work with Your Enemy -- Preface V -- Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion) -- On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions -- On the Key Role Intelligence Agencies can play to Restore our Democratic Institutions (Transcript of Discussion) -- On node capturing attacker strategies -- On node capturing attacker strategies (Transcript of Discussion) -- On the reliability of network measurement techniques used for malware traffic analysis -- On the reliability of network measurement techniques used for malware traffic analysis (Transcript of Discussion) -- Beyond Trust -- Beyond Trust (Transcript of Discussion) -- Fawkescoin A cryptocurrency without public-key cryptography -- FawkesCoin: A cryptocurrency without public-key cryptography (Transcript of Discussion).
Para consulta fuera de la UANL se requiere clave de acceso remoto.