Skip to main content
  • Conference proceedings
  • © 2013

Security Protocols

21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers

  • Proceedings of the 21st International Workshop on Security Protocols 2013

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8263)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Towards a Theory of Application Compartmentalisation

    • Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie
    Pages 19-27
  3. Authentication for Resilience: The Case of SDN

    • Dongting Yu, Andrew W. Moore, Chris Hall, Ross Anderson
    Pages 39-44
  4. Verifiable Postal Voting

    • Josh Benaloh, Peter Y. A. Ryan, Vanessa Teague
    Pages 54-65
  5. ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets

    • Jun Zhao, Virgil Gligor, Adrian Perrig, James Newsome
    Pages 94-114
  6. Enhancements to Prepare-and-Measure Based QKD Protocols

    • Peter Y. A. Ryan, Bruce Christianson
    Pages 123-133
  7. Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks

    • Rushil Khurana, Shishir Nagaraja
    Pages 143-151
  8. Communication Setup in Anonymous Messaging

    • Francesco Bergadano
    Pages 161-169

Other Volumes

  1. Security Protocols XXI

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security Protocols, held in Cambridge, UK, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What's Happening on the Other Channel?".

Editors and Affiliations

  • School of Computer Science, University of Hertfordshire, Hertfordshire, UK

    Bruce Christianson, James Malcolm

  • Computer Laboratory, University of Cambridge, Cambridge, UK

    Frank Stajano, Jonathan Anderson

  • Center for Information Technology Policy, Princeton University, Princeton, USA

    Joseph Bonneau

Bibliographic Information

  • Book Title: Security Protocols

  • Book Subtitle: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers

  • Editors: Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-642-41717-7

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2013

  • Softcover ISBN: 978-3-642-41716-0Published: 13 November 2013

  • eBook ISBN: 978-3-642-41717-7Published: 05 November 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: X, 267

  • Number of Illustrations: 23 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Computer Science, general

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access