Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers

Front Cover
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
Springer Science & Business Media, 2011 - Business & Economics - 255 pages
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was “Remodelling the Attacker” with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn’t the attacker’s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Remodelling the Attacker Transcript of Discussion
1
Fighting the Good Internet War
3
Security Protocol Deployment Risk
12
Security Protocol Deployment Risk Transcript of Discussion
21
Do Not Model the Attacker
25
Do Not Model the Attacker Transcript of Discussion
36
Generating Random Numbers in Hostile Environments
38
Generating Random Numbers in Hostile Environments Transcript of Discussion
51
Problems of Provenance for Digital Libraries
126
Problems of Provenance for Digital Libraries Transcript of Discussion
134
Towards Understanding Pure PublishSubscribe Cryptographic Protocols
144
Towards Understanding Pure PublishSubscribe Cryptographic Protocols Transcript of Discussion
156
Password Authenticated Key Exchange by Juggling
159
Password Authenticated Key Exchange by Juggling Transcript of Discussion
172
A Real World Application of Secure Multiparty Computations
180
A Real World Application of Secure Multiparty Computations Transcript of Discussion
191

PeertoPeer Gambling in the Presence of Cheaters
54
Cyberdice Transcript of Discussion
71
Problems with Same Origin Policy
84
Problems with Same Origin Policy Transcript of Discussion
86
Hardened Stateless Session Cookies
93
Hardened Stateless Session Cookies Transcript of Discussion
102
TPMPerformance Sensible Key Management Protocols for Service Provisioning in Cloud Computing
107
TPMPerformance Sensible Key Management Protocols for Service Provisioning in Cloud Computing Transcript of Discussion
115
Handling New Adversaries in Wireless AdHoc Networks
118
Handling New Adversaries in Wireless AdHoc Networks Transcript of Discussion
120
Covert Communications Despite Traffic Data Retention
198
Covert Communications Despite Traffic Data Retention Transcript of Discussion
215
What Next after Anonymity?
220
What Next After Anonymity? Transcript of Discussion
223
Remodelling the Attacker in Voting Protocols
232
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting
241
Bridging the Gap between Vulnerabilities and Threats in Electronic Voting Transcript of Discussion
244
Are You There Moriarty?
256
Author Index
257
Copyright

Other editions - View all

Common terms and phrases