Security Protocols
Springer Berlin (Verlag)
978-3-642-04903-3 (ISBN)
Putting the Human Back in the Protocol.- Composing Security Metrics.- Putting the Human Back in Voting Protocols.- Putting the Human Back in Voting Protocols.- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture.- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture.- Phish and Chips.- Phish and Chips.- Where Next for Formal Methods?.- Where Next for Formal Methods?.- Cordial Security Protocol Programming.- Cordial Security Protocol Programming.- Privacy-Sensitive Congestion Charging.- Privacy-Sensitive Congestion Charging.- The Value of Location Information.- The Value of Location Information.- Update on PIN or Signature.- Innovations for Grid Security from Trusted Computing.- Innovations for Grid Security from Trusted Computing.- The Man-in-the-Middle Defence.- The Man-in-the-Middle Defence.- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries.- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries.- Secure Distributed Human Computation.- Secure Distributed Human Computation.- Bot, Cyborg and Automated Turing Test.- Bot, Cyborg and Automated Turing Test.- A 2-Round Anonymous Veto Protocol.- A 2-Round Anonymous Veto Protocol.- How to Speak an Authentication Secret Securely from an Eavesdropper.- How to Speak an Authentication Secret Securely from an Eavesdropper.- Secret Public Key Protocols Revisited.- Secret Public Key Protocols Revisited.- Vintage Bit Cryptography.- Vintage Bit Cryptography.- Usability of Security Management:Defining the Permissions of Guests.- Usability of Security Management: Defining the Permissions of Guests.- The Last Word.
Erscheint lt. Verlag | 15.10.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | IX, 287 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 462 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | API security • authentication • Bots • congestion charging • cryptography • Cyborgs • grid security • Hardcover, Softcover / Informatik, EDV/Informatik • location information • Network Security • Phishing • privacy • Public Key • rid security • rsa • secret key • security • security metrics • signature • trusted computing • turing test • veto protocol • voting protocols |
ISBN-10 | 3-642-04903-6 / 3642049036 |
ISBN-13 | 978-3-642-04903-3 / 9783642049033 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich