Security Protocols
Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roeen Limba Engleză Paperback – 5 sep 2005
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (8) | 318.19 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 4 ian 2011 | 321.03 lei 3-5 săpt. | |
| Springer – 12 apr 2000 | 318.19 lei 6-8 săpt. | |
| Springer – 13 ian 2004 | 318.94 lei 6-8 săpt. | |
| Springer – 23 sep 2002 | 318.94 lei 6-8 săpt. | |
| Springer – 13 sep 2006 | 323.41 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 12 sep 2001 | 327.36 lei 6-8 săpt. | |
| Springer – 5 sep 2005 | 348.83 lei 38-44 zile | |
| Springer Berlin, Heidelberg – 15 oct 2009 | 374.91 lei 6-8 săpt. |
Preț: 348.83 lei
Preț vechi: 436.04 lei
-20% Nou
Puncte Express: 523
Preț estimativ în valută:
61.74€ • 71.90$ • 53.92£
61.74€ • 71.90$ • 53.92£
Carte tipărită la comandă
Livrare economică 17-23 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540283898
ISBN-10: 3540283897
Pagini: 364
Ilustrații: X, 354 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.55 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540283897
Pagini: 364
Ilustrații: X, 354 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.55 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Where Have All the Protocols Gone?.- A Protocol’s Life After Attacks....- A Protocol’s Life After Attacks....- Towards Flexible Credential Negotiation Protocols.- Towards Flexible Credential Negotiation Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Towards a Framework for Autonomic Security Protocols.- Towards a Framework for Autonomic Security Protocols.- Client v. Server Side Protocols, Interfaces and Storage.- Client v. Server Side Protocols, Interfaces and Storage.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Protocol Codesign.- Protocol Codesign.- Enforcing Security Policies for Distributed Objects Applications.- Enforcing Security Policies for Distributed Objects Applications.- Regular SPKI.- Regular SPKI.- Federated Identity-Management Protocols.- Federated Identity-Management Protocols.- Enforcing the Unenforceable.- Is the Verification Problem for Cryptographic Protocols Solved?.- Secure Sessions from Weak Secrets.- Secure Sessions from Weak Secrets.- Panel Session: Is Protocol Modelling Finished?.- WAR: Wireless Anonymous Routing.- WAR: Wireless Anonymous Routing.- Limitations of IPsec Policy Mechanisms.- Limitations of IPsec Policy Mechanisms.- Deniable Authenticated Key Establishment for Internet Protocols.- Deniable Authenticated Key Establishment for Internet Protocols.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- What We Can Learn from API Security.- Addressing New Challenges by Building Security Protocols Around Graphs.- From Security Protocols to Systems Security.- FromSecurity Protocols to Systems Security.- Biometrics to Enhance Smartcard Security.- Biometrics to Enhance Smartcard Security.- Blind Publication: A Copyright Library without Publication or Trust.- Blind Publication: A Copyright Library Without Publication or Trust.
Caracteristici
Unique visibility State-of-the-art survey Fast-track conference proceedings
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.