Security Protocols
Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roeen Limba Engleză Paperback – 13 ian 2004
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (8) | 318.19 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 4 ian 2011 | 321.03 lei 3-5 săpt. | |
| Springer – 12 apr 2000 | 318.19 lei 6-8 săpt. | |
| Springer – 13 ian 2004 | 318.94 lei 6-8 săpt. | |
| Springer – 23 sep 2002 | 318.94 lei 6-8 săpt. | |
| Springer – 13 sep 2006 | 323.41 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 12 sep 2001 | 327.36 lei 6-8 săpt. | |
| Springer – 5 sep 2005 | 348.83 lei 38-44 zile | |
| Springer Berlin, Heidelberg – 15 oct 2009 | 374.91 lei 6-8 săpt. |
Preț: 318.94 lei
Preț vechi: 398.67 lei
-20% Nou
Puncte Express: 478
Preț estimativ în valută:
56.45€ • 65.81$ • 49.37£
56.45€ • 65.81$ • 49.37£
Carte tipărită la comandă
Livrare economică 21 ianuarie-04 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540208303
ISBN-10: 3540208305
Pagini: 256
Ilustrații: VIII, 248 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.39 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540208305
Pagini: 256
Ilustrații: VIII, 248 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.39 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
(Transcript).- Keynote Address.- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.- Is Entity Authentication Necessary?.- A Structured Operational Modelling of the Dolev-Yao Threat Model.- On Trust Establishment in Mobile Ad-Hoc Networks.- Legally Authorized and Unauthorized Digital Evidence.- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing.- Contractual Access Control.- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.- Analyzing Delegation Properties.- Combinatorial Optimization of Countermeasures against Illegal Copying.- Protocols with Certified-Transfer Servers.- An Architecture for an Adaptive Intrusion-Tolerant Server.- Supporting Imprecise Delegation in KeyNote.- Modeling Protocols for Secure Group Communications in Ad Hoc Networks.- Delegation of Signalling Rights.- Mobile IPv6 Security.- Concluding Discussion: Accounting for Resources.- Back to the Beginning.
Caracteristici
Includes supplementary material: sn.pub/extras
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.