Skip to main content
  • Conference proceedings
  • © 2018

Security Protocols XXVI

26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11286)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

    Pages I-XI
  2. Raven Authentication Service

    • Graham Rymer, David Llewellyn-Jones
    Pages 1-14
  3. Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    • Wanpeng Li, Chris J. Mitchell, Thomas Chen
    Pages 24-41
  4. Non-monotonic Security Protocols and Failures in Financial Intermediation

    • Fabio Massacci, Chan Nam Ngo, Daniele Venturi, Julian Williams
    Pages 45-54
  5. HoneyPAKEs

    • José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala
    Pages 63-77
  6. HoneyPAKEs (Transcript of Discussion)

    • Peter Y. A. Ryan
    Pages 78-83
  7. Entropy Crowdsourcing – Protocols for Link Key Updates in Wireless Sensor Networks

    • Lukas Nemec, Radim Ostadal, Vashek Matyas, Petr Svenda
    Pages 84-92
  8. Daemones Non Operantur Nisi Per Artem

    • Taciane Martimiano, Jean Everson Martina
    Pages 96-105
  9. Daemones Non Operantur Nisi Per Artem

    • Jean Everson Martina
    Pages 106-113
  10. Intentionality and Agency in Security

    • Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano
    Pages 114-125
  11. Incentives in Security Protocols

    • Sarah Azouvi, Alexander Hicks, Steven J. Murdoch
    Pages 132-141
  12. Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System

    • Tudor Dumitraş, Yiğitcan Kaya, Radu Mărginean, Octavian Suciu
    Pages 150-162

Other Volumes

  1. Security Protocols XXVI

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018.

The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.


Editors and Affiliations

  • Masaryk University, Brno, Czech Republic

    Vashek Matyáš, Petr Švenda

  • University of Cambridge, Cambridge, UK

    Frank Stajano

  • University of Hertfordshire, Hatfield, UK

    Bruce Christianson

  • Memorial University of Newfoundland, St. John's, Canada

    Jonathan Anderson

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access