Security Protocols [[electronic resource] ] : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Application software Computers and civilization Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Computers and Society |
ISBN |
1-283-47747-5
9786613477477 3-642-17773-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466039603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols [[electronic resource] ] : 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (IX, 287 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Data structures (Computer science) Computers and civilization Personal computers Cryptology Systems and Data Security Computer Communication Networks Data Structures and Information Theory Computers and Society Personal Computing |
ISBN | 3-642-04904-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming -- Cordial Security Protocol Programming -- Privacy-Sensitive Congestion Charging -- Privacy-Sensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The Man-in-the-Middle Defence -- The Man-in-the-Middle Defence -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot, Cyborg and Automated Turing Test -- Bot, Cyborg and Automated Turing Test -- A 2-Round Anonymous Veto Protocol -- A 2-Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Usability of Security Management:Defining the Permissions of Guests -- Usability of Security Management: Defining the Permissions of Guests -- The Last Word. |
Record Nr. | UNISA-996465858603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols [[electronic resource] ] : 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (X, 390 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Algorithms Management information systems Computer science Computers and civilization Operating systems (Computers) Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Computers and Society Operating Systems |
ISBN | 3-540-40926-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction: Authentic Privacy -- Limits to Anonymity When Using Credentials -- Limits to Anonymity When Using Credentials (Transcript of Discussion) -- A Cryptographic Framework for the Controlled Release of Certified Data -- A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion) -- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA -- One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion) -- Authentication Components: Engineering Experiences and Guidelines -- Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion) -- Accountable Privacy -- Accountable Privacy (Transcript of Discussion) -- Toward a Broader View of Security Protocols -- Toward a Broader View of Security Protocols (Transcript of Discussion) -- Privacy, Control and Internet Mobility -- Privacy, Control and Internet Mobility (Transcript of Discussion) -- Controlling Who Tracks Me -- Controlling Who Tracks Me (Transcript of Discussion) -- BLIND: A Complete Identity Protection Framework for End-Points -- BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion) -- Privacy Is Linking Permission to Purpose -- Privacy is Linking Permission to Purpose (Transcript of Discussion) -- Establishing Trust with Privacy -- Establishing Trust with Privacy (Transcript of Discussion) -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System -- Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion) -- The Dancing Bear: A New Way of Composing Ciphers -- The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion) -- Identity and Location -- Identity and Location (Transcript of Discussion) -- Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) -- Pseudonymity in the Light of Evidence-Based Trust -- Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion) -- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection -- Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion) -- Why Are We Authenticating (Transcript of Discussion) -- Anonymous Authentication -- Anonymous Authentication (Transcript of Discussion) -- Towards a Mechanism for Discretionary Overriding of Access Control -- Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion) -- Last Orders. |
Record Nr. | UNISA-996466118203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols [[electronic resource] ] : 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (X, 354 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Computers and civilization Operating systems (Computers) Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Computers and Society Operating Systems |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust. |
Record Nr. | UNISA-996465920903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols [[electronic resource] ] : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (VIII, 248 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Algorithms Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Algorithm Analysis and Problem Complexity Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-39871-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning. |
Record Nr. | UNISA-996465900003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (VIII, 248 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer networks Operating systems (Computers) Algorithms Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Algorithm Analysis and Problem Complexity Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-39871-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning. |
Record Nr. | UNINA-9910144210003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Protocols [[electronic resource] ] : 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (X, 246 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Algorithms Computer communication systems Management information systems Computer science Computers and civilization Operating systems (Computers) Cryptology Algorithm Analysis and Problem Complexity Computer Communication Networks Management of Computing and Information Systems Computers and Society Operating Systems |
ISBN | 3-540-45807-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security -- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World -- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Thwarting Timing Attacks Using ATM Networks -- Thwarting Timing Attacks Using ATM Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- PIM Security -- PIM Security -- Merkle Puzzles Revisited — Finding Matching Elements between Lists -- Merkle Puzzles Revisited -- Encapsulating Rules of Prudent Security Engineering -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A Multi-OS Approach to Trusted Computer Systems -- A Proof of Non-repudiation -- A Proof of Non-repudiation -- Using Authority Certificates to Create Management Structures -- Using Attribute Certificates for Creating Management Structures -- Trust Management and Whether to Delegate -- Trust Management and Whether to Delegate -- You Can’t Take It with You -- Protocols Using Keys from Faulty Data -- Protocols Using Keys from Faulty Data -- On the Negotiation of Access Control Policies -- Negotiation of Access Control Policies -- Intrusion-Tolerant Group Management in Enclaves -- Lightweight Authentication in a Mobile Network -- Bluetooth Security — Fact or Fiction? -- Concluding Discussion When Does Confidentiality Harm Security? -- The Last Word. |
Record Nr. | UNISA-996465521003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols : 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2002.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 |
Descrizione fisica | 1 online resource (X, 246 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Algorithms Computer networks Management information systems Computer science Computers and civilization Operating systems (Computers) Cryptology Algorithm Analysis and Problem Complexity Computer Communication Networks Management of Computing and Information Systems Computers and Society Operating Systems |
ISBN | 3-540-45807-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security -- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World -- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Thwarting Timing Attacks Using ATM Networks -- Thwarting Timing Attacks Using ATM Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- PIM Security -- PIM Security -- Merkle Puzzles Revisited — Finding Matching Elements between Lists -- Merkle Puzzles Revisited -- Encapsulating Rules of Prudent Security Engineering -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A Multi-OS Approach to Trusted Computer Systems -- A Proof of Non-repudiation -- A Proof of Non-repudiation -- Using Authority Certificates to Create Management Structures -- Using Attribute Certificates for Creating Management Structures -- Trust Management and Whether to Delegate -- Trust Management and Whether to Delegate -- You Can’t Take It with You -- Protocols Using Keys from Faulty Data -- Protocols Using Keys from Faulty Data -- On the Negotiation of Access Control Policies -- Negotiation of Access Control Policies -- Intrusion-Tolerant Group Management in Enclaves -- Lightweight Authentication in a Mobile Network -- Bluetooth Security — Fact or Fiction? -- Concluding Discussion When Does Confidentiality Harm Security? -- The Last Word. |
Record Nr. | UNINA-9910143892703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Protocols [[electronic resource] ] : 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (VIII, 264 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Algorithms Management information systems Computer science Information technology Business—Data processing Systems and Data Security Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems IT in Business |
ISBN | 3-540-44810-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers and Principals -- Authentication and Naming -- Users and Trust in Cyberspace -- Users and Trust in Cyberspace -- Interactive Identification Protocols -- Open Questions -- Looking on the Bright Side of Black-Box Cryptography -- Government Access to Keys - Panel Discussion -- Making Sense of Specifications: The Formalization of SET -- Making Sense of Specifications: The Formalization of SET -- Lack of Explicitness Strikes Back -- Lack of Explicitness Strikes Back -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- The Correctness of Crypto Transaction Sets -- The Correctness of Crypto Transaction Sets -- Micro-management of Risk in a Trust-Based Billing System -- Broadening the Scope of Fault Tolerance within Secure Services -- Broadening the Scope of Fault Tolerance within Secure Services -- DOS-Resistant Authentication with Client Puzzles -- DOS-Resistant Authentication with Client Puzzles -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Denial of Service — Panel Discussion -- The Resurrecting Duckling — What Next? -- The Resurrecting Duckling — What Next? -- An Anonymous Auction Protocol Using “Money Escrow” -- Short Certification of Secure RSA Modulus -- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis — -- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis — -- I Cannot Tell a Lie -- Afterward. |
Record Nr. | UNISA-996465789803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (VIII, 264 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer networks Algorithms Management information systems Computer science Information technology Business—Data processing Systems and Data Security Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems IT in Business |
ISBN | 3-540-44810-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers and Principals -- Authentication and Naming -- Users and Trust in Cyberspace -- Users and Trust in Cyberspace -- Interactive Identification Protocols -- Open Questions -- Looking on the Bright Side of Black-Box Cryptography -- Government Access to Keys - Panel Discussion -- Making Sense of Specifications: The Formalization of SET -- Making Sense of Specifications: The Formalization of SET -- Lack of Explicitness Strikes Back -- Lack of Explicitness Strikes Back -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- The Correctness of Crypto Transaction Sets -- The Correctness of Crypto Transaction Sets -- Micro-management of Risk in a Trust-Based Billing System -- Broadening the Scope of Fault Tolerance within Secure Services -- Broadening the Scope of Fault Tolerance within Secure Services -- DOS-Resistant Authentication with Client Puzzles -- DOS-Resistant Authentication with Client Puzzles -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Denial of Service — Panel Discussion -- The Resurrecting Duckling — What Next? -- The Resurrecting Duckling — What Next? -- An Anonymous Auction Protocol Using “Money Escrow” -- Short Certification of Secure RSA Modulus -- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis — -- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis — -- I Cannot Tell a Lie -- Afterward. |
Record Nr. | UNINA-9910143629403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|