Security protocols XXVII : 27th international workshop, Cambridge, UK, April 10-12, 2019, revised selected papers / Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyáš, editors.

This volume contains the revised proceedings of the 27th International Workshop on Security Protocols, held at Trinity College, Cambridge, UK, during April 10-12, 2019. The theme of this year's workshop was "security protocols for humans." Getting protocol details right is critical in...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: International Workshop on Security Protocols Cambridge, England
Other Authors: Anderson, Jonathan (Computer scientist) (Editor), Stajano, Frank (Editor), Christianson, Bruce (Editor), Matyás̆, Vashek (Editor)
Other title:Security protocols 27.
Format: Conference Proceeding eBook
Language:English
Published: Cham, Switzerland : Springer Nature, [2020]
Edition:First edition.
Series:Lecture notes in computer science ; 12287.
LNCS sublibrary. Security and cryptology ; 12287.
Subjects:
Table of Contents:
  • Designing for humans ; Transparency enhancing technologies to make security protocols work for humans / Alexander Hicks and Steven J. Murdoch ; Transparency enhancing technologies to make security protocols work for humans (transcript of discussion) / Steven J. Murdoch
  • Audio CAPTCHA with a few cocktails : it's so noisy I can't hear you / Benjamin Maximilian Reinheimer, Fairooz Islam, and Ilia Shumailov ; Audio CAPTCHA with a few cocktails : it's so noisy I can't hear you (transcript of discussion) / Benjamin Maximilian Reinheimer, Fairooz Islam, and Ilia Shumailov
  • Understanding human ; Shaping our mental model of security / Saša Radomirović ; Shaping our mental model of security (transcript of discussion) / Saša Radomirović
  • Social constructionism in security protocols : a position on human experience, psychology and security / Simon N. Foley and Vivien M. Rooney ; Social constructionism in security protocols (transcript of discussion) / Simon N. Foley and Vivien M. Rooney
  • Fresh perspectives ; Bounded temporal fairness for FIFO financial markets / Vasilios Mavroudis ; Bounded temporal fairness for FIFO financial markets (transcript of discussion) / Vasilios Mavroudis
  • Mismorphism : the heart of the weird machine / Prashant Anantharaman, Vijay Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, and Sean W. Smith ; Mismorphism : the heart of the weird machine (transcript of discussion) / Prashant Anantharaman
  • Human limitations in security ; Affordable security or big guy vs small guy : does the depth of your pockets impact your protocols? / Daniele Friolo, Fabio Massacci, Chan Nam Ngo, and Daniele Venturi ; Affordable security or big guy vs small guy (transcript of discussion) / Chan Nam Ngo
  • Human-computability boundaries / Vijay Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, and Sean W. Smith ; Human-computability boundaries (transcript of discussion) / Vijay Kothari and Michael C. Millian
  • Secure sharing and collaboration ; Challenges in designing a distributed cryptographic file system / Arastoo Bozorgi, Mahya Soleimani Jadidi, and Jonathan Anderson ; Challenges in designing a distributed cryptographic file system (transcript of discussion) / Arastoo Bozorgi, Mahya Soleimani Jadidi, and Jonathan Anderson
  • Is the future finally arriving? ; Zero-knowledge user authentication : an old idea whose time has come / Laurent Chuat, Sarah Plocher, and Adrian Perrig ; Zero-knowledge user authentication : an old idea whose time has come (transcript of discussion) / Laurent Chuat
  • A rest stop on the unending road to provable security / Virgil D. Gligor ; A rest stop on the unending road to provable security (transcript of discussion) / Virgil D. Gligor
  • Evidence of humans behaving badly ; Ghost trace on the wire? Using key evidence for informed decisions / Diana A. Vasile, Martin Kleppmann, Daniel R. Thomas, and Alastair R. Beresford ; Ghost trace on the wire? Using key evidence for informed decisions (transcript of discussion) / Diana A. Vasile
  • Warnings ; Evolution of SSL/TLS indicators and warnings in web browsers / Lydia Kraus, Martin Ukrop, Vashek Matyas, and Tobias Fiebig ; Evolution of SSL/TLS indicators and warnings in web browsers (transcript of discussion) / Lydia Kraus
  • Snitches get stitches : on the difficulty of whistleblowing / Mansoor Ahmed-Rengers, Ross Anderson, Darija Halatova, and Ilia Shumailov ; Snitches get stitches : on the difficulty of whistleblowing (transcript of discussion) / Mansoor Ahmed-Rengers, Ross Anderson, Darija Halatova, and Ilia Shumailov.