Security Protocols
Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roeen Limba Engleză Paperback – 12 apr 2000
Preț: 319.17 lei
Preț vechi: 398.97 lei
-20%
Puncte Express: 479
Carte tipărită la comandă
Livrare economică 11-25 iunie
Specificații
ISBN-13: 9783540673811
ISBN-10: 3540673814
Pagini: 244
Ilustrații: XII, 232 p.
Dimensiuni: 155 x 233 x 14 mm
Greutate: 0.37 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540673814
Pagini: 244
Ilustrații: XII, 232 p.
Dimensiuni: 155 x 233 x 14 mm
Greutate: 0.37 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote Address: The Changing Environment.- Composing Security Properties.- Auditing against Multiple Policies.- Jikzi: A New Framework for Secure Publishing.- Jikzi: A New Framework for Secure Publishing.- Power and Permission in Security Systems.- Power and Permission in Computer Systems.- Auditing against Impossible Abstractions.- What is Authentication?.- Relations Between Secrets: The Yahalom Protocol.- The Yahalom Protocol.- Modelling Agents’ Knowledge Inductively.- Modelling Agents’ Knowledge Inductively.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Trust Management and Network Layer Security Protocols.- Trust Management and Network Layer Security Protocols.- Issues in Multicast Security.- Issues in Multicast Security.- Performance of Protocols.- Performance of Protocols.- Integrity-Aware PCBC Encryption Schemes.- Integrity-Aware PCBC Encryption Schemes.- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.- The Resurrecting Duckling.- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.- INTERNET-MARKs.- Pictures Can’t Lie under Oath.- Pictures Can’t Lie under Oath.- Bob versus Bob – Good Guy/Bad Guy.
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.