Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers

Author:   Bruce Christianson ,  Bruno Crispo ,  James A. Malcolm ,  Michael Roe
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2004 ed.
Volume:   2845
ISBN:  

9783540208303


Pages:   248
Publication Date:   13 January 2004
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $171.47 Quantity:  
Add to Cart

Share |

Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Protocols, held in Cambridge, UK, in April 2002.The 16 revised full papers presented together with transcriptions of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Also included are abstracts and summaries of an introduction and a keynote, as well as a concluding discussion and statement. Among the topics addressed are authentication, mobile ad-hoc network security, secure distributed document processing, access control, confidentiality, protocol attacks, delegation, certified transfer servers, intrusion tolerance, multi-party communication protocols, IPv6 security, and others.

Full Product Details

Author:   Bruce Christianson ,  Bruno Crispo ,  James A. Malcolm ,  Michael Roe
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2004 ed.
Volume:   2845
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.800kg
ISBN:  

9783540208303


ISBN 10:   3540208305
Pages:   248
Publication Date:   13 January 2004
Audience:   College/higher education ,  General/trade ,  Tertiary & Higher Education ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

(Transcript).- Keynote Address.- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.- Is Entity Authentication Necessary?.- A Structured Operational Modelling of the Dolev-Yao Threat Model.- On Trust Establishment in Mobile Ad-Hoc Networks.- Legally Authorized and Unauthorized Digital Evidence.- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing.- Contractual Access Control.- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.- Analyzing Delegation Properties.- Combinatorial Optimization of Countermeasures against Illegal Copying.- Protocols with Certified-Transfer Servers.- An Architecture for an Adaptive Intrusion-Tolerant Server.- Supporting Imprecise Delegation in KeyNote.- Modeling Protocols for Secure Group Communications in Ad Hoc Networks.- Delegation of Signalling Rights.- Mobile IPv6 Security.- Concluding Discussion: Accounting for Resources.- Back to the Beginning.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List