Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers /
Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was "Authentic Privacy." Tradition...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Security and Cryptology ;
3957 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Introduction: Authentic Privacy
- Limits to Anonymity When Using Credentials
- Limits to Anonymity When Using Credentials (Transcript of Discussion)
- A Cryptographic Framework for the Controlled Release of Certified Data
- A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion)
- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
- One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion)
- Authentication Components: Engineering Experiences and Guidelines
- Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion)
- Accountable Privacy
- Accountable Privacy (Transcript of Discussion)
- Toward a Broader View of Security Protocols
- Toward a Broader View of Security Protocols (Transcript of Discussion)
- Privacy, Control and Internet Mobility
- Privacy, Control and Internet Mobility (Transcript of Discussion)
- Controlling Who Tracks Me
- Controlling Who Tracks Me (Transcript of Discussion)
- BLIND: A Complete Identity Protection Framework for End-Points
- BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion)
- Privacy Is Linking Permission to Purpose
- Privacy is Linking Permission to Purpose (Transcript of Discussion)
- Establishing Trust with Privacy
- Establishing Trust with Privacy (Transcript of Discussion)
- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion)
- The Dancing Bear: A New Way of Composing Ciphers
- The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion)
- Identity and Location
- Identity and Location (Transcript of Discussion)
- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion)
- Pseudonymity in the Light of Evidence-Based Trust
- Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion)
- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection
- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion)
- Why Are We Authenticating (Transcript of Discussion)
- Anonymous Authentication
- Anonymous Authentication (Transcript of Discussion)
- Towards a Mechanism for Discretionary Overriding of Access Control
- Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion)
- Last Orders.