Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers / Bruce Christianson [and others] (eds.).

Contributor(s): Christianson, Bruce | International Workshop on Security Protocols (9th : 2001 : Cambridge, England)
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 2467.Publisher: Berlin ; New York : Springer, 2002Description: 1 online resource (ix, 238 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9783540458074; 3540458077Subject(s): Computer security -- Congresses | Computers -- Access control -- Congresses | Cryptography -- Congresses | Computer security | Computers -- Access control | Cryptography | Gegevens | Databanken | Cryptografie | BeveiligingGenre/Form: Electronic books. | Conference papers and proceedings. | Congressen (vorm) Additional physical formats: Print version:: Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papersDDC classification: 005.8 LOC classification: QA76.9.A25 | S443 2002Other classification: 54.62 | 17 | 28 | 37 | SS 2001 | SS 4800 | ST 276 Online resources: Click here to access online
Contents:
Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security -- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World -- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Thwarting Timing Attacks Using ATM Networks -- Thwarting Timing Attacks Using ATM Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- PIM Security -- PIM Security -- Merkle Puzzles Revisited -- Finding Matching Elements between Lists -- Merkle Puzzles Revisited -- Encapsulating Rules of Prudent Security Engineering -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A Multi-OS Approach to Trusted Computer Systems -- A Proof of Non-repudiation -- A Proof of Non-repudiation -- Using Authority Certificates to Create Management Structures -- Using Attribute Certificates for Creating Management Structures -- Trust Management and Whether to Delegate -- Trust Management and Whether to Delegate -- You Can't Take It with You -- Protocols Using Keys from Faulty Data -- Protocols Using Keys from Faulty Data -- On the Negotiation of Access Control Policies -- Negotiation of Access Control Policies -- Intrusion-Tolerant Group Management in Enclaves -- Lightweight Authentication in a Mobile Network -- Bluetooth Security -- Fact or Fiction? -- Concluding Discussion When Does Confidentiality Harm Security? -- The Last Word.
Summary: This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Security Protocols held in Cambridge, UK in April 2001. The 13 revised full papers presented together with transcriptions of the discussions following the presentations have gone through two rounds of reviewing, revision, and selection. Also included are abstracts and transcriptions of invited presentations and topically focused discussions. Among the topics addressed are mobile computing and security, denial of service, authentication, Internet protocols, timing attacks, PIM security, security engineering, non-repudiation, trust management, access control policies, and Bluetooth security.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Proceedings of 9th International Workshop on Security Protocols.

Includes bibliographical references and index.

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Security Protocols held in Cambridge, UK in April 2001. The 13 revised full papers presented together with transcriptions of the discussions following the presentations have gone through two rounds of reviewing, revision, and selection. Also included are abstracts and transcriptions of invited presentations and topically focused discussions. Among the topics addressed are mobile computing and security, denial of service, authentication, Internet protocols, timing attacks, PIM security, security engineering, non-repudiation, trust management, access control policies, and Bluetooth security.

Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security -- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World -- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Thwarting Timing Attacks Using ATM Networks -- Thwarting Timing Attacks Using ATM Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- PIM Security -- PIM Security -- Merkle Puzzles Revisited -- Finding Matching Elements between Lists -- Merkle Puzzles Revisited -- Encapsulating Rules of Prudent Security Engineering -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A Multi-OS Approach to Trusted Computer Systems -- A Proof of Non-repudiation -- A Proof of Non-repudiation -- Using Authority Certificates to Create Management Structures -- Using Attribute Certificates for Creating Management Structures -- Trust Management and Whether to Delegate -- Trust Management and Whether to Delegate -- You Can't Take It with You -- Protocols Using Keys from Faulty Data -- Protocols Using Keys from Faulty Data -- On the Negotiation of Access Control Policies -- Negotiation of Access Control Policies -- Intrusion-Tolerant Group Management in Enclaves -- Lightweight Authentication in a Mobile Network -- Bluetooth Security -- Fact or Fiction? -- Concluding Discussion When Does Confidentiality Harm Security? -- The Last Word.

There are no comments for this item.

to post a comment.

Powered by Koha