Christianson / Crispo / Malcom | Security Protocols | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 4631, 350 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Christianson / Crispo / Malcom Security Protocols

13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
2007
ISBN: 978-3-540-77156-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers

E-Book, Englisch, Band 4631, 350 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-77156-2
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. There are 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, and access control.

Christianson / Crispo / Malcom Security Protocols jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


The System Likes You.- Experiences with Host-to-Host IPsec.- Experiences with Host-to-Host IPsec.- Repairing the Bluetooth Pairing Protocol.- Repairing the Bluetooth Pairing Protocol.- Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags.- Keep on Blockin’ in the Free World.- PIN (and Chip) or Signature: Beating the Cheating?.- PIN (and Chip) or Signature: Beating the Cheating?.- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Authorisation Subterfuge by Delegation in Decentralised Networks.- Authorisation Subterfuge by Delegation in Decentralised Networks.- Multi-channel Protocols.- Multi-channel Protocols.- Combining Crypto with Biometrics: A New Human-Security Interface.- User-Friendly Grid Security Architecture and Protocols.- User-Friendly Grid Security Architecture and Protocols.- Countering Automated Exploits with System Security CAPTCHAS.- Countering Automated Exploits with System Security CAPTCHAS.- The System Likes You?.- Enhancing Privacy with Shared Pseudo Random Sequences.- Enhancing Privacy with Shared Pseudo Random Sequences.- Non-repudiation and the Metaphysics of Presence.- Non-repudiation and the Metaphysics of Presence.- Understanding Why Some Network Protocols Are User-Unfriendly.- Understanding Why Some Network Protocols Are User-Unfriendly.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Listen Too Closely and You May Be Confused.- Listen Too Closely and You May Be Confused.- The Dining Freemasons (Security Protocols for Secret Societies).- The Dining Freemasons (Security Protocols for Secret Societies).- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).- Safer Scripting Through Precompilation.- Safer Scripting Through Precompilation.- Implementing a Multi-hat PDA.- Implementing a Multi-hat PDA.- Anonymous Context Based Role Activation Mechanism.- Anonymous Context Based Role Activation Mechanism.- Topology of Covert Conflict.- The Initial Costs and Maintenance Costs of Protocols.- The Initial Costs and Maintenance Costs of Protocols.- Alice and Bob.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.