LEADER 04186nam 22008895 450 001 9910780042403321 005 20230810133849.0 010 $a1-280-20490-7 010 $a9786610204908 010 $a0-306-46958-8 024 7 $a10.1007/b115767 035 $a(CKB)111056486606590 035 $a(EBL)3035322 035 $a(SSID)ssj0000099006 035 $a(PQKBManifestationID)11127785 035 $a(PQKBTitleCode)TC0000099006 035 $a(PQKBWorkID)10006627 035 $a(PQKB)11374566 035 $a(DE-He213)978-0-306-46958-9 035 $a(MiAaPQ)EBC3035322 035 $a(MiAaPQ)EBC197153 035 $a(Au-PeEL)EBL3035322 035 $a(CaPaEBR)ebr10046925 035 $a(CaONFJC)MIL20490 035 $a(OCoLC)923695081 035 $a(Au-PeEL)EBL197153 035 $a(OCoLC)711745054 035 $a(EXLCZ)99111056486606590 100 $a20100301d2002 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Network and Distributed Systems Security$b[electronic resource] $eIFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26?27, 2001, Leuven, Belgium /$fedited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen 205 $a1st ed. 2002. 210 1$aNew York, NY :$cSpringer US :$cImprint: Springer,$d2002. 215 $a1 online resource (218 p.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v78 300 $aDescription based upon print version of record. 311 $a0-7923-7558-0 320 $aIncludes bibliographical references and index. 327 $aA Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell?s Trust Domain Infrastructure Security Certification. 330 $aThe more our society relies on electronic forms of communication, the more the security of these communication networks is essential for its well-functioning. As a consequence, research on methods and techniques to improve network security is extremely important. Topics in this volume include the developments in: security protocols; secure software engineering; mobile agent security; e-commerce security; and security for distributed computing. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v78 606 $aComputer science 606 $aMicroprocessors 606 $aComputer architecture 606 $aComputer networks 606 $aElectronic commerce 606 $aElectronic data processing$xManagement 606 $aTheory of Computation 606 $aProcessor Architectures 606 $aComputer Communication Networks 606 $ae-Commerce and e-Business 606 $aIT Operations 615 0$aComputer science. 615 0$aMicroprocessors. 615 0$aComputer architecture. 615 0$aComputer networks. 615 0$aElectronic commerce. 615 0$aElectronic data processing$xManagement. 615 14$aTheory of Computation. 615 24$aProcessor Architectures. 615 24$aComputer Communication Networks. 615 24$ae-Commerce and e-Business. 615 24$aIT Operations. 676 $a005.8 701 $aDecker$b Bart de$f1958-$01569422 712 12$aIFIP TC11 WG11.4 Working Conference on Network Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910780042403321 996 $aAdvances in Network and Distributed Systems Security$93842344 997 $aUNINA