Cantitate/Preț
Produs

Security Protocols XXVIII: 28th International Workshop, Cambridge, UK, March 27–28, 2023, Revised Selected Papers: Lecture Notes in Computer Science, cartea 14186

Editat de Frank Stajano, Vashek Matyáš, Bruce Christianson, Jonathan Anderson
en Limba Engleză Paperback – 22 oct 2023
This book constitutes the refereed post-conference proceedings of the 28th International Workshop on Security Protocols, held in Cambridge, UK, during March 27–28, 2023.
Thirteen papers out of 23 submissions were selected for publication in this book, presented together with the respective transcripts of discussions. The theme of this year's workshop was “Humans in security protocols — are we learning from mistakes?”
The topics covered are securing the human endpoint and proving humans correct.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 37756 lei

Preț vechi: 47195 lei
-20% Nou

Puncte Express: 566

Preț estimativ în valută:
7225 7577$ 6025£

Carte tipărită la comandă

Livrare economică 07-21 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031430329
ISBN-10: 3031430328
Pagini: 271
Ilustrații: XI, 271 p. 25 illus., 18 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.4 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Sleepwalking into Disaster? Requirements Engineering for Digital Cash.- Transporting a Secret Using Destructively-Read Memory.- Authentication of IT Professionals in the Wild - A Survey.- Incentives and Censorship Resistance for Mixnets Revisited.- Can’t Keep them Away: The Failures of Anti-Stalking Protocols in Personal Item Tracking Devices.- Who is Benefiting from Your Fitness Data? A Privacy Analysis of Smartwatches.- Trusted Introductions for Secure Messaging.- Choosing Your Friends: Shaping Ethical Use of Anonymity Networks.- One Protocol to Rule them All? On Securing Interoperable Messaging.- If it’s Provably Secure, it Probably isn’t: Why Learning from Proof Failure is Hard.- Towards Human-Centric Endpoint Security.- Determining an Economic Value of High Assurance for Commodity Software Security.- Blind Auditing and Probabilistic Access Controls.