Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4631 : Security and Cryptology

ISBN: 3540771557, 9783540771555

Size: 3 MB (2859968 bytes)

Pages: 350/354

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540771557, 9783540771555

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was “The systemlikes youandwants to be yourfriend.” Security is usually seen as making systems more di?cult for humans to use. Might there be advantages to looking at security in the context of more general design problems? Perhaps those investigating the general properties of system design and those of us in the security community have more to say to each other than we thought. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, and to the University of Hertfordshire for lending us several of their sta?. Particular thanks to Johanna Hunt of the University of Hertfordshire for being our impresario and organizing everything, and to Lori Klimaszewska of the University of CambridgeComputing Service for transcribing the audio tapes (in which the “crash barriers” nearly prevented collisions). The Security Protocols Workshop exists because you, the audience, part- ipate. Once you have dived into these proceedings and have had some Eleatic thoughts, we expect to hear from you.

Table of contents :
Front Matter….Pages –
The System Likes You….Pages 1-2
Experiences with Host-to-Host IPsec….Pages 3-22
Experiences with Host-to-Host IPsec….Pages 23-30
Repairing the Bluetooth Pairing Protocol….Pages 31-45
Repairing the Bluetooth Pairing Protocol….Pages 46-50
Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags….Pages 51-59
Keep on Blockin’ in the Free World….Pages 60-68
PIN (and Chip) or Signature: Beating the Cheating?….Pages 69-75
PIN (and Chip) or Signature: Beating the Cheating?….Pages 76-81
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)….Pages 82-88
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)….Pages 89-96
Authorisation Subterfuge by Delegation in Decentralised Networks….Pages 97-102
Authorisation Subterfuge by Delegation in Decentralised Networks….Pages 103-111
Multi-channel Protocols….Pages 112-127
Multi-channel Protocols….Pages 128-132
Combining Crypto with Biometrics: A New Human-Security Interface….Pages 133-138
User-Friendly Grid Security Architecture and Protocols….Pages 139-156
User-Friendly Grid Security Architecture and Protocols….Pages 157-161
Countering Automated Exploits with System Security CAPTCHAS….Pages 162-169
Countering Automated Exploits with System Security CAPTCHAS….Pages 170-179
The System Likes You?….Pages 180-186
Enhancing Privacy with Shared Pseudo Random Sequences….Pages 187-196
Enhancing Privacy with Shared Pseudo Random Sequences….Pages 197-203
Non-repudiation and the Metaphysics of Presence….Pages 204-206
Non-repudiation and the Metaphysics of Presence….Pages 207-214
Understanding Why Some Network Protocols Are User-Unfriendly….Pages 215-219
Understanding Why Some Network Protocols Are User-Unfriendly….Pages 220-227
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer….Pages 228-237
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer….Pages 238-244
Listen Too Closely and You May Be Confused….Pages 245-249
Listen Too Closely and You May Be Confused….Pages 250-257
The Dining Freemasons (Security Protocols for Secret Societies)….Pages 258-265
The Dining Freemasons (Security Protocols for Secret Societies)….Pages 266-275
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)….Pages 276-283
Safer Scripting Through Precompilation….Pages 284-288
Safer Scripting Through Precompilation….Pages 289-294
Implementing a Multi-hat PDA….Pages 295-307
Implementing a Multi-hat PDA….Pages 308-314
Anonymous Context Based Role Activation Mechanism….Pages 315-321
Anonymous Context Based Role Activation Mechanism….Pages 322-328
Topology of Covert Conflict….Pages 329-332
The Initial Costs and Maintenance Costs of Protocols….Pages 333-335
The Initial Costs and Maintenance Costs of Protocols….Pages 336-343
Alice and Bob….Pages 344-345
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers”
Shopping Cart
Scroll to Top