Cantitate/Preț
Produs

Security Protocols

Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
en Limba Engleză Paperback – 5 sep 2005
Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (8) 31819 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 4 ian 2011 32103 lei  3-5 săpt.
  Springer – 12 apr 2000 31819 lei  6-8 săpt.
  Springer – 13 ian 2004 31894 lei  6-8 săpt.
  Springer – 23 sep 2002 31894 lei  6-8 săpt.
  Springer – 13 sep 2006 32341 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 12 sep 2001 32736 lei  6-8 săpt.
  Springer – 5 sep 2005 34883 lei  38-44 zile
  Springer Berlin, Heidelberg – 15 oct 2009 37491 lei  6-8 săpt.

Preț: 34883 lei

Preț vechi: 43604 lei
-20% Nou

Puncte Express: 523

Preț estimativ în valută:
6174 7190$ 5392£

Carte tipărită la comandă

Livrare economică 17-23 ianuarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540283898
ISBN-10: 3540283897
Pagini: 364
Ilustrații: X, 354 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.55 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Where Have All the Protocols Gone?.- A Protocol’s Life After Attacks....- A Protocol’s Life After Attacks....- Towards Flexible Credential Negotiation Protocols.- Towards Flexible Credential Negotiation Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Towards a Framework for Autonomic Security Protocols.- Towards a Framework for Autonomic Security Protocols.- Client v. Server Side Protocols, Interfaces and Storage.- Client v. Server Side Protocols, Interfaces and Storage.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Protocol Codesign.- Protocol Codesign.- Enforcing Security Policies for Distributed Objects Applications.- Enforcing Security Policies for Distributed Objects Applications.- Regular SPKI.- Regular SPKI.- Federated Identity-Management Protocols.- Federated Identity-Management Protocols.- Enforcing the Unenforceable.- Is the Verification Problem for Cryptographic Protocols Solved?.- Secure Sessions from Weak Secrets.- Secure Sessions from Weak Secrets.- Panel Session: Is Protocol Modelling Finished?.- WAR: Wireless Anonymous Routing.- WAR: Wireless Anonymous Routing.- Limitations of IPsec Policy Mechanisms.- Limitations of IPsec Policy Mechanisms.- Deniable Authenticated Key Establishment for Internet Protocols.- Deniable Authenticated Key Establishment for Internet Protocols.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- What We Can Learn from API Security.- Addressing New Challenges by Building Security Protocols Around Graphs.- From Security Protocols to Systems Security.- FromSecurity Protocols to Systems Security.- Biometrics to Enhance Smartcard Security.- Biometrics to Enhance Smartcard Security.- Blind Publication: A Copyright Library without Publication or Trust.- Blind Publication: A Copyright Library Without Publication or Trust.

Caracteristici

Unique visibility State-of-the-art survey Fast-track conference proceedings

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.