Security Protocols
Springer Berlin (Verlag)
978-3-540-67381-1 (ISBN)
Keynote Address: The Changing Environment.- Composing Security Properties.- Auditing against Multiple Policies.- Jikzi: A New Framework for Secure Publishing.- Jikzi: A New Framework for Secure Publishing.- Power and Permission in Security Systems.- Power and Permission in Computer Systems.- Auditing against Impossible Abstractions.- What is Authentication?.- Relations Between Secrets: The Yahalom Protocol.- The Yahalom Protocol.- Modelling Agents' Knowledge Inductively.- Modelling Agents' Knowledge Inductively.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Trust Management and Network Layer Security Protocols.- Trust Management and Network Layer Security Protocols.- Issues in Multicast Security.- Issues in Multicast Security.- Performance of Protocols.- Performance of Protocols.- Integrity-Aware PCBC Encryption Schemes.- Integrity-Aware PCBC Encryption Schemes.- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.- The Resurrecting Duckling.- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.- INTERNET-MARKs.- Pictures Can't Lie under Oath.- Pictures Can't Lie under Oath.- Bob versus Bob - Good Guy/Bad Guy.
Erscheint lt. Verlag | 12.4.2000 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 232 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 354 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Schlagworte | Algorithm analysis and problem complexity • authentication • Bridge • Information Security • Internet Security • Networks • Performance • privacy • secure networks • security • security protocols • Systems Security • trust management |
ISBN-10 | 3-540-67381-4 / 3540673814 |
ISBN-13 | 978-3-540-67381-1 / 9783540673811 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich