Skip to main content
  • Conference proceedings
  • © 2014

Security Protocols XXII

22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8809)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XI
  2. Why Bother Securing DNS?

    • Dieter Gollmann
    Pages 1-8
  3. Collaborating as Normal: Detecting Systemic Anomalies in Your Partner

    • Olgierd Pieczul, Simon N. Foley
    Pages 18-27
  4. Remark!: A Secure Protocol for Remote Exams

    • Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
    Pages 38-48
  5. Red Queen’s Race: APT Win-Win Game

    • Vit Bukac, Vaclav Lorenc, Vashek Matyáš
    Pages 55-61
  6. Better Authentication: Password Revolution by Evolution

    • Daniel R. Thomas, Alastair R. Beresford
    Pages 130-145
  7. Collaborating with the Enemy on Network Management

    • Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W. Moore et al.
    Pages 154-162
  8. Bootstrapping Adoption of the Pico Password Replacement System

    • Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington
    Pages 172-186
  9. I Bought a New Security Token and All I Got Was This Lousy Phish—Relay Attacks on Visual Code Authentication Schemes

    • Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano
    Pages 197-215

Other Volumes

  1. Security Protocols XXII

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".

Editors and Affiliations

  • University of Hertfordshire, Hertfordshire, United Kingdom

    Bruce Christianson, James Malcolm

  • Masaryk University Faculty of Informatics, Brno, Czech Republic

    Vashek Matyáš, Petr Švenda

  • University of Cambridge, Cambridge, United Kingdom

    Frank Stajano

  • Memorial University of Newfoundland, St. John's, Canada

    Jonathan Anderson

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access