Security Protocols
Springer Berlin (Verlag)
978-3-540-44263-9 (ISBN)
Keynote Address: Mobile Computing versus Immobile Security.- Experiences of Mobile IP Security.- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Thwarting Timing Attacks Using ATM Networks.- Thwarting Timing Attacks Using ATM Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- PIM Security.- PIM Security.- Merkle Puzzles Revisited - Finding Matching Elements between Lists.- Merkle Puzzles Revisited.- Encapsulating Rules of Prudent Security Engineering.- Encapsulating Rules of Prudent Security Engineering.- A Multi-OS Approach to Trusted Computer Systems.- A Multi-OS Approach to Trusted Computer Systems.- A Proof of Non-repudiation.- A Proof of Non-repudiation.- Using Authority Certificates to Create Management Structures.- Using Attribute Certificates for Creating Management Structures.- Trust Management and Whether to Delegate.- Trust Management and Whether to Delegate.- You Can't Take It with You.- Protocols Using Keys from Faulty Data.- Protocols Using Keys from Faulty Data.- On the Negotiation of Access Control Policies.- Negotiation of Access Control Policies.- Intrusion-Tolerant Group Management in Enclaves.- Lightweight Authentication in a Mobile Network.- Bluetooth Security - Fact or Fiction?.- Concluding Discussion When Does Confidentiality Harm Security?.- The Last Word.
Erscheint lt. Verlag | 23.9.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 246 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 363 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • Architecture • authentication • Bluetooth • cryptographic protocols • Data Security • denial of service • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Internet • Internet Security • IPv6 • Networks • Network Security • privacy • Secure Communications • Secure Networking • security • security protocols • Systems Security • Trust |
ISBN-10 | 3-540-44263-4 / 3540442634 |
ISBN-13 | 978-3-540-44263-9 / 9783540442639 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich