Cantitate/Preț
Produs

Security Protocols

Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
en Limba Engleză Paperback – 23 sep 2002
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was “mobile computing versus immobile security”. As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our desire is that you will join with us in this activity, and that as a result you will, like many of our participants, feel moved to propound something quite di?erent from what you originally planned. Our thanks as always to Prof. Roger Needham, FRS and to Microsoft - search Ltd. (Cambridge) for the use of the meeting room and co?ee machine. Thanks also to Lori Klimaszewska of the University of Cambridge Computing Service for transcribing the audio tapes (and for revealing in “Audrey James” a previously unsuspected double life of a well-known double agent), and to Dr. Mary Buchanan for her assistance in editing the transcripts into a Thucydidean mould. Actually, we are often asked how we go about producing the transcripts, especially upon those occasions when, for various reasons, no audio recording was made. This year we bow to pressure and reveal the details of our methodology in the Afterword.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (8) 31819 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 4 ian 2011 32103 lei  3-5 săpt.
  Springer – 12 apr 2000 31819 lei  6-8 săpt.
  Springer – 13 ian 2004 31894 lei  6-8 săpt.
  Springer – 23 sep 2002 31894 lei  6-8 săpt.
  Springer – 13 sep 2006 32341 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 12 sep 2001 32736 lei  6-8 săpt.
  Springer – 5 sep 2005 34883 lei  38-44 zile
  Springer Berlin, Heidelberg – 15 oct 2009 37491 lei  6-8 săpt.

Preț: 31894 lei

Preț vechi: 39867 lei
-20% Nou

Puncte Express: 478

Preț estimativ în valută:
5645 6573$ 4930£

Carte tipărită la comandă

Livrare economică 21 ianuarie-04 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540442639
ISBN-10: 3540442634
Pagini: 256
Ilustrații: X, 246 p.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.39 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Keynote Address: Mobile Computing versus Immobile Security.- Experiences of Mobile IP Security.- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Thwarting Timing Attacks Using ATM Networks.- Thwarting Timing Attacks Using ATM Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- PIM Security.- PIM Security.- Merkle Puzzles Revisited — Finding Matching Elements between Lists.- Merkle Puzzles Revisited.- Encapsulating Rules of Prudent Security Engineering.- Encapsulating Rules of Prudent Security Engineering.- A Multi-OS Approach to Trusted Computer Systems.- A Multi-OS Approach to Trusted Computer Systems.- A Proof of Non-repudiation.- A Proof of Non-repudiation.- Using Authority Certificates to Create Management Structures.- Using Attribute Certificates for Creating Management Structures.- Trust Management and Whether to Delegate.- Trust Management and Whether to Delegate.- You Can’t Take It with You.- Protocols Using Keys from Faulty Data.- Protocols Using Keys from Faulty Data.- On the Negotiation of Access Control Policies.- Negotiation of Access Control Policies.- Intrusion-Tolerant Group Management in Enclaves.- Lightweight Authentication in a Mobile Network.- Bluetooth Security — Fact or Fiction?.- Concluding Discussion When Does Confidentiality Harm Security?.- The Last Word.

Caracteristici

Includes supplementary material: sn.pub/extras

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.