Jump to ratings and reviews
Rate this book

Security Protocols: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers

Rate this book
What's Happening on the Other Channel? (Transcript of Discussion).- Towards New Security Primitives Based on Hard AI Problems.- Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion).- Towards a Theory of Application Compartmentalisation.- Towards a Theory of Application Compartmentalisation (Transcript of Discussion).- Authentication for The Case of SDN.- Authentication for The Case of SDN (Transcript of Discussion).- Verifiable Postal Voting.- End-to-End Verifiable Postal Voting (Transcript of Discussion).- Independent Computations for Safe Remote Electronic Voting.- Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion).- Revisiting Device Attestation with Bounded Leakage of Secrets.- Revisiting Device Attestation with Bounded Leakage of Secrets (Transcript of Discussion).- Enhancements to Prepare-and-Measure Based QKD Protocols.- Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion).- Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks.- Simple Defences against Vibration-Based-Keystroke Fingerprinting Attacks (Transcript of Discussion).- Communication Setup in Anonymous Messaging.- Communication Setup in Anonymous Messaging (Transcript of Discussion).- Towards a Stronger Location Integrity.- Towards a Stronger Location Integrity (Transcript of Discussion.-Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication.- Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication (Transcript of Discussion).- Spraying Diffie-Hellman for Secure Key Exchange in MANETs.- Spraying Diffie-Hellman for Secure Key Exchange in MANETs (Transcript of Discussion).- On the Origin of Yet another Channel.- On the Origin of Yet another Channel (Transcript of Discussion).- Verifiable Classroom Where Cryptography Meets Pedagogy.- Verifiable Classroom Where Cryptography Meets Pedagogy (Transcript of Discussion).- Creative Uses for the Other Channel.

280 pages, Paperback

First published November 13, 2013

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.