Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV017742717
    Format: VIII, 241 S.
    ISBN: 3-540-20830-5
    Series Statement: Lecture notes in computer science 2845
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mobile Computing ; IP ; Sicherheitsprotokoll ; Mobilfunk ; Sicherheitsprotokoll ; Authentifikation ; Telekommunikationsnetz ; Sicherheitsprotokoll ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Author information: Christianson, Bruce, 1958-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947920446602882
    Format: VIII, 248 p. , online resource.
    ISBN: 9783540398714
    Series Statement: Lecture Notes in Computer Science, 2845
    Content: Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.
    Note: (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540208303
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_749258934
    Format: Online-Ressource (VIII, 243 p. Also available online) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540398714 , 3540208305 , 9783540208303
    Series Statement: Lecture Notes in Computer Science 2845
    Content: This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Protocols, held in Cambridge, UK, in April 2002. The 16 revised full papers presented together with transcriptions of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Also included are abstracts and summaries of an introduction and a keynote, as well as a concluding discussion and statement. Among the topics addressed are authentication, mobile ad-hoc network security, secure distributed document processing, access control, confidentiality, protocol attacks, delegation, certified transfer servers, intrusion tolerance, multi-party communication protocols, IPv6 security, and others
    Note: Literaturangaben
    Additional Edition: ISBN 9783540208303
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662175453
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540208303
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948621049702882
    Format: VIII, 248 p. , online resource.
    Edition: 1st ed. 2004.
    ISBN: 9783540398714
    Series Statement: Lecture Notes in Computer Science, 2845
    Content: Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol Participants." Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.
    Note: (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662175453
    Additional Edition: Printed edition: ISBN 9783540208303
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540203803?
Did you mean 9783540108603?
Did you mean 9783540083603?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages