Cargando…

Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Christianson, Bruce (Editor ), Crispo, Bruno (Editor ), Malcolm, James A. (Editor ), Roe, Michael (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3364
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Where Have All the Protocols Gone?
  • A Protocol's Life After Attacks...
  • A Protocol's Life After Attacks...
  • Towards Flexible Credential Negotiation Protocols
  • Towards Flexible Credential Negotiation Protocols
  • Man-in-the-Middle in Tunnelled Authentication Protocols
  • Man-in-the-Middle in Tunnelled Authentication Protocols
  • Towards a Framework for Autonomic Security Protocols
  • Towards a Framework for Autonomic Security Protocols
  • Client v. Server Side Protocols, Interfaces and Storage
  • Client v. Server Side Protocols, Interfaces and Storage
  • Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
  • Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
  • Protocol Codesign
  • Protocol Codesign
  • Enforcing Security Policies for Distributed Objects Applications
  • Enforcing Security Policies for Distributed Objects Applications
  • Regular SPKI
  • Regular SPKI
  • Federated Identity-Management Protocols
  • Federated Identity-Management Protocols
  • Enforcing the Unenforceable
  • Is the Verification Problem for Cryptographic Protocols Solved?
  • Secure Sessions from Weak Secrets
  • Secure Sessions from Weak Secrets
  • Panel Session: Is Protocol Modelling Finished?
  • WAR: Wireless Anonymous Routing
  • WAR: Wireless Anonymous Routing
  • Limitations of IPsec Policy Mechanisms
  • Limitations of IPsec Policy Mechanisms
  • Deniable Authenticated Key Establishment for Internet Protocols
  • Deniable Authenticated Key Establishment for Internet Protocols
  • Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
  • Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
  • What We Can Learn from API Security
  • Addressing New Challenges by Building Security Protocols Around Graphs
  • From Security Protocols to Systems Security
  • From Security Protocols to Systems Security
  • Biometrics to Enhance Smartcard Security
  • Biometrics to Enhance Smartcard Security
  • Blind Publication: A Copyright Library without Publication or Trust
  • Blind Publication: A Copyright Library Without Publication or Trust.