Security Protocols
Springer Berlin (Verlag)
978-3-540-77155-5 (ISBN)
The System Likes You.- Experiences with Host-to-Host IPsec.- Experiences with Host-to-Host IPsec.- Repairing the Bluetooth Pairing Protocol.- Repairing the Bluetooth Pairing Protocol.- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.- Keep on Blockin' in the Free World.- PIN (and Chip) or Signature: Beating the Cheating?.- PIN (and Chip) or Signature: Beating the Cheating?.- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Authorisation Subterfuge by Delegation in Decentralised Networks.- Authorisation Subterfuge by Delegation in Decentralised Networks.- Multi-channel Protocols.- Multi-channel Protocols.- Combining Crypto with Biometrics: A New Human-Security Interface.- User-Friendly Grid Security Architecture and Protocols.- User-Friendly Grid Security Architecture and Protocols.- Countering Automated Exploits with System Security CAPTCHAS.- Countering Automated Exploits with System Security CAPTCHAS.- The System Likes You?.- Enhancing Privacy with Shared Pseudo Random Sequences.- Enhancing Privacy with Shared Pseudo Random Sequences.- Non-repudiation and the Metaphysics of Presence.- Non-repudiation and the Metaphysics of Presence.- Understanding Why Some Network Protocols Are User-Unfriendly.- Understanding Why Some Network Protocols Are User-Unfriendly.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Listen Too Closely and You May Be Confused.- Listen Too Closely and You May Be Confused.- The Dining Freemasons (Security Protocols for Secret Societies).-The Dining Freemasons (Security Protocols for Secret Societies).- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).- Safer Scripting Through Precompilation.- Safer Scripting Through Precompilation.- Implementing a Multi-hat PDA.- Implementing a Multi-hat PDA.- Anonymous Context Based Role Activation Mechanism.- Anonymous Context Based Role Activation Mechanism.- Topology of Covert Conflict.- The Initial Costs and Maintenance Costs of Protocols.- The Initial Costs and Maintenance Costs of Protocols.- Alice and Bob.
Erscheint lt. Verlag | 30.11.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | IX, 350 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 545 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • ad-hoc network security • Algorithm analysis and problem complexity • anonymity • authentication • bank security • block/stream ciphers • Bridge • cryptographic protocols • Delegation • denial of service • dynamic public keys • grid security • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Internet Security • Mobile Security • Network Security • PGP • Phishing • privacy • protocol attacks • public-key authentication • Secure Communications • secure group communications • security • security protocols • SPKI • Systems Security |
ISBN-10 | 3-540-77155-7 / 3540771557 |
ISBN-13 | 978-3-540-77155-5 / 9783540771555 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich