Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3364 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Where Have All the Protocols Gone?
- A Protocol's Life After Attacks...
- A Protocol's Life After Attacks...
- Towards Flexible Credential Negotiation Protocols
- Towards Flexible Credential Negotiation Protocols
- Man-in-the-Middle in Tunnelled Authentication Protocols
- Man-in-the-Middle in Tunnelled Authentication Protocols
- Towards a Framework for Autonomic Security Protocols
- Towards a Framework for Autonomic Security Protocols
- Client v. Server Side Protocols, Interfaces and Storage
- Client v. Server Side Protocols, Interfaces and Storage
- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
- Protocol Codesign
- Protocol Codesign
- Enforcing Security Policies for Distributed Objects Applications
- Enforcing Security Policies for Distributed Objects Applications
- Regular SPKI
- Regular SPKI
- Federated Identity-Management Protocols
- Federated Identity-Management Protocols
- Enforcing the Unenforceable
- Is the Verification Problem for Cryptographic Protocols Solved?
- Secure Sessions from Weak Secrets
- Secure Sessions from Weak Secrets
- Panel Session: Is Protocol Modelling Finished?
- WAR: Wireless Anonymous Routing
- WAR: Wireless Anonymous Routing
- Limitations of IPsec Policy Mechanisms
- Limitations of IPsec Policy Mechanisms
- Deniable Authenticated Key Establishment for Internet Protocols
- Deniable Authenticated Key Establishment for Internet Protocols
- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
- What We Can Learn from API Security
- Addressing New Challenges by Building Security Protocols Around Graphs
- From Security Protocols to Systems Security
- From Security Protocols to Systems Security
- Biometrics to Enhance Smartcard Security
- Biometrics to Enhance Smartcard Security
- Blind Publication: A Copyright Library without Publication or Trust
- Blind Publication: A Copyright Library Without Publication or Trust.