Cantitate/Preț
Produs

Security Protocols

Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
en Limba Engleză Paperback – 12 apr 2000
Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (8) 31819 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 4 ian 2011 32103 lei  3-5 săpt.
  Springer – 12 apr 2000 31819 lei  6-8 săpt.
  Springer – 13 ian 2004 31894 lei  6-8 săpt.
  Springer – 23 sep 2002 31894 lei  6-8 săpt.
  Springer – 13 sep 2006 32341 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 12 sep 2001 32736 lei  6-8 săpt.
  Springer – 5 sep 2005 34883 lei  38-44 zile
  Springer Berlin, Heidelberg – 15 oct 2009 37491 lei  6-8 săpt.

Preț: 31819 lei

Preț vechi: 39775 lei
-20% Nou

Puncte Express: 477

Preț estimativ în valută:
5632 6565$ 4925£

Carte tipărită la comandă

Livrare economică 20 ianuarie-03 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540673811
ISBN-10: 3540673814
Pagini: 244
Ilustrații: XII, 232 p.
Dimensiuni: 155 x 233 x 14 mm
Greutate: 0.37 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Keynote Address: The Changing Environment.- Composing Security Properties.- Auditing against Multiple Policies.- Jikzi: A New Framework for Secure Publishing.- Jikzi: A New Framework for Secure Publishing.- Power and Permission in Security Systems.- Power and Permission in Computer Systems.- Auditing against Impossible Abstractions.- What is Authentication?.- Relations Between Secrets: The Yahalom Protocol.- The Yahalom Protocol.- Modelling Agents’ Knowledge Inductively.- Modelling Agents’ Knowledge Inductively.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Trust Management and Network Layer Security Protocols.- Trust Management and Network Layer Security Protocols.- Issues in Multicast Security.- Issues in Multicast Security.- Performance of Protocols.- Performance of Protocols.- Integrity-Aware PCBC Encryption Schemes.- Integrity-Aware PCBC Encryption Schemes.- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.- The Resurrecting Duckling.- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.- INTERNET-MARKs.- Pictures Can’t Lie under Oath.- Pictures Can’t Lie under Oath.- Bob versus Bob – Good Guy/Bad Guy.

Caracteristici

Includes supplementary material: sn.pub/extras

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.