Security and Trust Management 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings /

Security and Trust Management 17th International Workshop, STM 2021, Darmstadt, Germany, October 8, 2021, Proceedings / [electronic resource] : edited by Rodrigo Roman, Jianying Zhou. - 1st ed. 2021. - IX, 205 p. 34 illus., 17 illus. in color. online resource. - Security and Cryptology, 13075 2946-1863 ; . - Security and Cryptology, 13075 .

Applied Cryptography -- An Aggregate Signature with Pre-Communication in the Plain Public Key Model -- The Adversary Capabilities In Practical Byzantine Fault Tolerance -- Privacy -- Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services -- Efficient permutation protocol for MPC in the head -- Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF 78 -- Formal Methods for Security and Trust -- Secure Implementation of a Quantum-Future GAKE Protocol -- Deciding a Fragment of (alpha, beta)-Privacy -- Systems Security -- TLS beyond the broker: Enforcing ne-grained security and trust in publish/subscribe environments for IoT -- Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols -- Towards Decentralized and Provably Secure Cross-Domain Solutions.

This book constitutes the proceedings of the 17th International Workshop on Security and Trust Management, STM 2021, co-located with the 26th European Symposium on Research in Computer Security, ESORICS 2021. The conference was planned to take place in Darmstadt, Germany. It was held online on October 8, 2021, due to the COVID-19 pandemic. The 10 papers presented in this volume were carefully reviewed and selected from 26 submissions. They were organized in topical sections on applied cryptography; privacy; formal methods for security and trust; and systems security. .

9783030918590

10.1007/978-3-030-91859-0 doi


Data protection.
Application software.
Computer engineering.
Computer networks .
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Computer and Information Systems Applications.
Computer Engineering and Networks.
Cryptology.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in