Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540771557, 9783540771555
Table of contents :
Front Matter….Pages –
The System Likes You….Pages 1-2
Experiences with Host-to-Host IPsec….Pages 3-22
Experiences with Host-to-Host IPsec….Pages 23-30
Repairing the Bluetooth Pairing Protocol….Pages 31-45
Repairing the Bluetooth Pairing Protocol….Pages 46-50
Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags….Pages 51-59
Keep on Blockin’ in the Free World….Pages 60-68
PIN (and Chip) or Signature: Beating the Cheating?….Pages 69-75
PIN (and Chip) or Signature: Beating the Cheating?….Pages 76-81
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)….Pages 82-88
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)….Pages 89-96
Authorisation Subterfuge by Delegation in Decentralised Networks….Pages 97-102
Authorisation Subterfuge by Delegation in Decentralised Networks….Pages 103-111
Multi-channel Protocols….Pages 112-127
Multi-channel Protocols….Pages 128-132
Combining Crypto with Biometrics: A New Human-Security Interface….Pages 133-138
User-Friendly Grid Security Architecture and Protocols….Pages 139-156
User-Friendly Grid Security Architecture and Protocols….Pages 157-161
Countering Automated Exploits with System Security CAPTCHAS….Pages 162-169
Countering Automated Exploits with System Security CAPTCHAS….Pages 170-179
The System Likes You?….Pages 180-186
Enhancing Privacy with Shared Pseudo Random Sequences….Pages 187-196
Enhancing Privacy with Shared Pseudo Random Sequences….Pages 197-203
Non-repudiation and the Metaphysics of Presence….Pages 204-206
Non-repudiation and the Metaphysics of Presence….Pages 207-214
Understanding Why Some Network Protocols Are User-Unfriendly….Pages 215-219
Understanding Why Some Network Protocols Are User-Unfriendly….Pages 220-227
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer….Pages 228-237
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer….Pages 238-244
Listen Too Closely and You May Be Confused….Pages 245-249
Listen Too Closely and You May Be Confused….Pages 250-257
The Dining Freemasons (Security Protocols for Secret Societies)….Pages 258-265
The Dining Freemasons (Security Protocols for Secret Societies)….Pages 266-275
On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)….Pages 276-283
Safer Scripting Through Precompilation….Pages 284-288
Safer Scripting Through Precompilation….Pages 289-294
Implementing a Multi-hat PDA….Pages 295-307
Implementing a Multi-hat PDA….Pages 308-314
Anonymous Context Based Role Activation Mechanism….Pages 315-321
Anonymous Context Based Role Activation Mechanism….Pages 322-328
Topology of Covert Conflict….Pages 329-332
The Initial Costs and Maintenance Costs of Protocols….Pages 333-335
The Initial Costs and Maintenance Costs of Protocols….Pages 336-343
Alice and Bob….Pages 344-345
Back Matter….Pages –
Reviews
There are no reviews yet.