LEADER 03386nam 22006614a 450 001 9910454808503321 005 20200520144314.0 010 $a1-280-20490-7 010 $a9786610204908 010 $a0-306-46958-8 024 7 $a10.1007/b115767 035 $a(CKB)111056486606590 035 $a(EBL)3035322 035 $a(SSID)ssj0000099006 035 $a(PQKBManifestationID)11127785 035 $a(PQKBTitleCode)TC0000099006 035 $a(PQKBWorkID)10006627 035 $a(PQKB)11374566 035 $a(DE-He213)978-0-306-46958-9 035 $a(MiAaPQ)EBC3035322 035 $a(MiAaPQ)EBC197153 035 $a(Au-PeEL)EBL3035322 035 $a(CaPaEBR)ebr10046925 035 $a(CaONFJC)MIL20490 035 $a(OCoLC)923695081 035 $a(Au-PeEL)EBL197153 035 $a(OCoLC)711745054 035 $a(EXLCZ)99111056486606590 100 $a20010920d2002 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in network and distributed systems security$b[electronic resource] $eIFIP TC11 WG11.4 First Annual Working Conference on Network Security : November 26-27, 2001, Leuven, Belgium /$fedited by Bart de Decker ... [et al.] 205 $a1st ed. 2002. 210 $aBoston $cKluwer Academic Publishers$dc2002 215 $a1 online resource (218 p.) 225 1 $aInternational Federation for Information Processing 300 $aDescription based upon print version of record. 311 $a0-7923-7558-0 320 $aIncludes bibliographical references and index. 327 $aA Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell?s Trust Domain Infrastructure Security Certification. 330 $aThe more our society relies on electronic forms of communication, the more the security of these communication networks is essential for its well-functioning. As a consequence, research on methods and techniques to improve network security is extremely important. Topics in this volume include the developments in: security protocols; secure software engineering; mobile agent security; e-commerce security; and security for distributed computing. 410 0$aInternational Federation for Information Processing (Series) 606 $aComputer networks$xSecurity measures$vCongresses 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures 676 $a005.8 701 $aDecker$b Bart de$f1958-$0846406 712 12$aIFIP TC11 WG11.4 Working Conference on Network Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910454808503321 996 $aAdvances in network and distributed systems security$91891021 997 $aUNINA