top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security Protocols [[electronic resource] ] : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols [[electronic resource] ] : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Application software
Computers and civilization
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 1-283-47747-5
9786613477477
3-642-17773-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466039603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Application software
Computers and civilization
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 1-283-47747-5
9786613477477
3-642-17773-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910482981103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols [[electronic resource] ] : 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (IX, 287 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Data structures (Computer science)
Computers and civilization
Personal computers
Cryptology
Systems and Data Security
Computer Communication Networks
Data Structures and Information Theory
Computers and Society
Personal Computing
ISBN 3-642-04904-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming -- Cordial Security Protocol Programming -- Privacy-Sensitive Congestion Charging -- Privacy-Sensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The Man-in-the-Middle Defence -- The Man-in-the-Middle Defence -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot, Cyborg and Automated Turing Test -- Bot, Cyborg and Automated Turing Test -- A 2-Round Anonymous Veto Protocol -- A 2-Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Usability of Security Management:Defining the Permissions of Guests -- Usability of Security Management: Defining the Permissions of Guests -- The Last Word.
Record Nr. UNISA-996465858603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols : 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols : 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (IX, 287 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Data structures (Computer science)
Computers and civilization
Personal computers
Cryptology
Systems and Data Security
Computer Communication Networks
Data Structures and Information Theory
Computers and Society
Personal Computing
ISBN 3-642-04904-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming -- Cordial Security Protocol Programming -- Privacy-Sensitive Congestion Charging -- Privacy-Sensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The Man-in-the-Middle Defence -- The Man-in-the-Middle Defence -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot, Cyborg and Automated Turing Test -- Bot, Cyborg and Automated Turing Test -- A 2-Round Anonymous Veto Protocol -- A 2-Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Usability of Security Management:Defining the Permissions of Guests -- Usability of Security Management: Defining the Permissions of Guests -- The Last Word.
Record Nr. UNINA-9910483321103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols [[electronic resource] ] : 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (X, 390 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computers and civilization
Operating systems (Computers)
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computers and Society
Operating Systems
ISBN 3-540-40926-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Authentic Privacy -- Limits to Anonymity When Using Credentials -- Limits to Anonymity When Using Credentials (Transcript of Discussion) -- A Cryptographic Framework for the Controlled Release of Certified Data -- A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion) -- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA -- One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion) -- Authentication Components: Engineering Experiences and Guidelines -- Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion) -- Accountable Privacy -- Accountable Privacy (Transcript of Discussion) -- Toward a Broader View of Security Protocols -- Toward a Broader View of Security Protocols (Transcript of Discussion) -- Privacy, Control and Internet Mobility -- Privacy, Control and Internet Mobility (Transcript of Discussion) -- Controlling Who Tracks Me -- Controlling Who Tracks Me (Transcript of Discussion) -- BLIND: A Complete Identity Protection Framework for End-Points -- BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion) -- Privacy Is Linking Permission to Purpose -- Privacy is Linking Permission to Purpose (Transcript of Discussion) -- Establishing Trust with Privacy -- Establishing Trust with Privacy (Transcript of Discussion) -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion) -- The Dancing Bear: A New Way of Composing Ciphers -- The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion) -- Identity and Location -- Identity and Location (Transcript of Discussion) -- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) -- Pseudonymity in the Light of Evidence-Based Trust -- Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion) -- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection -- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion) -- Why Are We Authenticating (Transcript of Discussion) -- Anonymous Authentication -- Anonymous Authentication (Transcript of Discussion) -- Towards a Mechanism for Discretionary Overriding of Access Control -- Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion) -- Last Orders.
Record Nr. UNISA-996466118203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols : 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols : 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (X, 390 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computers and civilization
Operating systems (Computers)
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computers and Society
Operating Systems
ISBN 3-540-40926-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction: Authentic Privacy -- Limits to Anonymity When Using Credentials -- Limits to Anonymity When Using Credentials (Transcript of Discussion) -- A Cryptographic Framework for the Controlled Release of Certified Data -- A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion) -- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA -- One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion) -- Authentication Components: Engineering Experiences and Guidelines -- Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion) -- Accountable Privacy -- Accountable Privacy (Transcript of Discussion) -- Toward a Broader View of Security Protocols -- Toward a Broader View of Security Protocols (Transcript of Discussion) -- Privacy, Control and Internet Mobility -- Privacy, Control and Internet Mobility (Transcript of Discussion) -- Controlling Who Tracks Me -- Controlling Who Tracks Me (Transcript of Discussion) -- BLIND: A Complete Identity Protection Framework for End-Points -- BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion) -- Privacy Is Linking Permission to Purpose -- Privacy is Linking Permission to Purpose (Transcript of Discussion) -- Establishing Trust with Privacy -- Establishing Trust with Privacy (Transcript of Discussion) -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion) -- The Dancing Bear: A New Way of Composing Ciphers -- The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion) -- Identity and Location -- Identity and Location (Transcript of Discussion) -- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) -- Pseudonymity in the Light of Evidence-Based Trust -- Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion) -- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection -- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion) -- Why Are We Authenticating (Transcript of Discussion) -- Anonymous Authentication -- Anonymous Authentication (Transcript of Discussion) -- Towards a Mechanism for Discretionary Overriding of Access Control -- Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion) -- Last Orders.
Record Nr. UNINA-9910484673403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols [[electronic resource] ] : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 354 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Computers and civilization
Operating systems (Computers)
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computers and Society
Operating Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust.
Record Nr. UNISA-996465920903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 354 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Computers and civilization
Operating systems (Computers)
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Computers and Society
Operating Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust.
Record Nr. UNINA-9910483696003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Protocols [[electronic resource] ] : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols [[electronic resource] ] : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (VIII, 248 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-39871-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning.
Record Nr. UNISA-996465900003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security Protocols : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Security Protocols : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (VIII, 248 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-39871-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning.
Record Nr. UNINA-9910144210003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui