Security Protocols
Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roeen Limba Engleză Paperback – 23 sep 2002
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (8) | 318.19 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 4 ian 2011 | 321.03 lei 3-5 săpt. | |
| Springer – 12 apr 2000 | 318.19 lei 6-8 săpt. | |
| Springer – 13 ian 2004 | 318.94 lei 6-8 săpt. | |
| Springer – 23 sep 2002 | 318.94 lei 6-8 săpt. | |
| Springer – 13 sep 2006 | 323.41 lei 6-8 săpt. | |
| Springer Berlin, Heidelberg – 12 sep 2001 | 327.36 lei 6-8 săpt. | |
| Springer – 5 sep 2005 | 348.83 lei 38-44 zile | |
| Springer Berlin, Heidelberg – 15 oct 2009 | 374.91 lei 6-8 săpt. |
Preț: 318.94 lei
Preț vechi: 398.67 lei
-20% Nou
Puncte Express: 478
Preț estimativ în valută:
56.45€ • 65.73$ • 49.30£
56.45€ • 65.73$ • 49.30£
Carte tipărită la comandă
Livrare economică 21 ianuarie-04 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540442639
ISBN-10: 3540442634
Pagini: 256
Ilustrații: X, 246 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.39 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540442634
Pagini: 256
Ilustrații: X, 246 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.39 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote Address: Mobile Computing versus Immobile Security.- Experiences of Mobile IP Security.- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Thwarting Timing Attacks Using ATM Networks.- Thwarting Timing Attacks Using ATM Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- PIM Security.- PIM Security.- Merkle Puzzles Revisited — Finding Matching Elements between Lists.- Merkle Puzzles Revisited.- Encapsulating Rules of Prudent Security Engineering.- Encapsulating Rules of Prudent Security Engineering.- A Multi-OS Approach to Trusted Computer Systems.- A Multi-OS Approach to Trusted Computer Systems.- A Proof of Non-repudiation.- A Proof of Non-repudiation.- Using Authority Certificates to Create Management Structures.- Using Attribute Certificates for Creating Management Structures.- Trust Management and Whether to Delegate.- Trust Management and Whether to Delegate.- You Can’t Take It with You.- Protocols Using Keys from Faulty Data.- Protocols Using Keys from Faulty Data.- On the Negotiation of Access Control Policies.- Negotiation of Access Control Policies.- Intrusion-Tolerant Group Management in Enclaves.- Lightweight Authentication in a Mobile Network.- Bluetooth Security — Fact or Fiction?.- Concluding Discussion When Does Confidentiality Harm Security?.- The Last Word.
Caracteristici
Includes supplementary material: sn.pub/extras
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.