Security Protocols
Springer Berlin (Verlag)
978-3-540-28389-8 (ISBN)
Where Have All the Protocols Gone?.- A Protocol's Life After Attacks....- A Protocol's Life After Attacks....- Towards Flexible Credential Negotiation Protocols.- Towards Flexible Credential Negotiation Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Towards a Framework for Autonomic Security Protocols.- Towards a Framework for Autonomic Security Protocols.- Client v. Server Side Protocols, Interfaces and Storage.- Client v. Server Side Protocols, Interfaces and Storage.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Protocol Codesign.- Protocol Codesign.- Enforcing Security Policies for Distributed Objects Applications.- Enforcing Security Policies for Distributed Objects Applications.- Regular SPKI.- Regular SPKI.- Federated Identity-Management Protocols.- Federated Identity-Management Protocols.- Enforcing the Unenforceable.- Is the Verification Problem for Cryptographic Protocols Solved?.- Secure Sessions from Weak Secrets.- Secure Sessions from Weak Secrets.- Panel Session: Is Protocol Modelling Finished?.- WAR: Wireless Anonymous Routing.- WAR: Wireless Anonymous Routing.- Limitations of IPsec Policy Mechanisms.- Limitations of IPsec Policy Mechanisms.- Deniable Authenticated Key Establishment for Internet Protocols.- Deniable Authenticated Key Establishment for Internet Protocols.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- What We Can Learn from API Security.- Addressing New Challenges by Building Security Protocols Around Graphs.- From Security Protocols to Systems Security.- FromSecurity Protocols to Systems Security.- Biometrics to Enhance Smartcard Security.- Biometrics to Enhance Smartcard Security.- Blind Publication: A Copyright Library without Publication or Trust.- Blind Publication: A Copyright Library Without Publication or Trust.
Erscheint lt. Verlag | 5.9.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 354 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 1130 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • ad-hoc network security • Algorithm analysis and problem complexity • anonymity • authentication • Bridge • cryptographic protocols • Delegation • denial of service • Information Security • Internet Security • Mobile Security • Network Security • privacy • protocol attacks • Secure Communications • secure group communicati • secure group communications • security • security protocols • SPKI • Systems Security • verification |
ISBN-10 | 3-540-28389-7 / 3540283897 |
ISBN-13 | 978-3-540-28389-8 / 9783540283898 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich