Security Protocols: 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings

Author:   Bruce Christianson ,  Bruno Crispo ,  James A. Malcolm ,  Michael Roe
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2000 ed.
Volume:   1796
ISBN:  

9783540673811


Pages:   232
Publication Date:   12 April 2000
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $166.19 Quantity:  
Add to Cart

Share |

Security Protocols: 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings


Add your own review!

Overview

This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Security Protocols held in Cambridge, UK, in April 1999.The 20 revised contributions presented as position statements are followed by transcripts of the discussions between the authors and the audience; thus the volume reflects the lively interaction at the workshop. All relevant aspects of current research and development in the area are addressed.

Full Product Details

Author:   Bruce Christianson ,  Bruno Crispo ,  James A. Malcolm ,  Michael Roe
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2000 ed.
Volume:   1796
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.30cm
Weight:   0.780kg
ISBN:  

9783540673811


ISBN 10:   3540673814
Pages:   232
Publication Date:   12 April 2000
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Keynote Address: The Changing Environment.- Composing Security Properties.- Auditing against Multiple Policies.- Jikzi: A New Framework for Secure Publishing.- Jikzi: A New Framework for Secure Publishing.- Power and Permission in Security Systems.- Power and Permission in Computer Systems.- Auditing against Impossible Abstractions.- What is Authentication?.- Relations Between Secrets: The Yahalom Protocol.- The Yahalom Protocol.- Modelling Agents' Knowledge Inductively.- Modelling Agents' Knowledge Inductively.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Trust Management and Network Layer Security Protocols.- Trust Management and Network Layer Security Protocols.- Issues in Multicast Security.- Issues in Multicast Security.- Performance of Protocols.- Performance of Protocols.- Integrity-Aware PCBC Encryption Schemes.- Integrity-Aware PCBC Encryption Schemes.- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.- The Resurrecting Duckling.- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.- INTERNET-MARKs.- Pictures Can't Lie under Oath.- Pictures Can't Lie under Oath.- Bob versus Bob - Good Guy/Bad Guy.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List