ISBN-10:
3540283897
ISBN-13:
9783540283898
Pub. Date:
10/06/2005
Publisher:
Springer Berlin Heidelberg
Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / Edition 1

Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / Edition 1

Paperback

Current price is , Original price is $109.0. You
Select a Purchase Option (2005)
  • purchase options

Overview

Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers / Edition 1

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Security Protocols, held in Cambridge, UK, in April 2003. The 25 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Among the topics addressed are authentication, mobile ad-hoc network security, SPKI, verification of cryptographic protocols, denial of service, access control, protocol attacks, API security, biometrics for security, and others.

Product Details

ISBN-13: 9783540283898
Publisher: Springer Berlin Heidelberg
Publication date: 10/06/2005
Series: Lecture Notes in Computer Science , #3364
Edition description: 2005
Pages: 354
Product dimensions: 6.10(w) x 9.17(h) x 0.03(d)

Table of Contents

Where Have All the Prools Gone?.- A Prool’s Life After Attacks....- A Prool’s Life After Attacks....- Towards Flexible Credential Negotiation Prools.- Towards Flexible Credential Negotiation Prools.- Man-in-the-Middle in Tunnelled Authentication Prools.- Man-in-the-Middle in Tunnelled Authentication Prools.- Towards a Framework for Autonomic Security Prools.- Towards a Framework for Autonomic Security Prools.- Client v. Server Side Prools, Interfaces and Storage.- Client v. Server Side Prools, Interfaces and Storage.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Prool Codesign.- Prool Codesign.- Enforcing Security Policies for Distributed Objects Applications.- Enforcing Security Policies for Distributed Objects Applications.- Regular SPKI.- Regular SPKI.- Federated Identity-Management Prools.- Federated Identity-Management Prools.- Enforcing the Unenforceable.- Is the Verification Problem for Cryptographic Prools Solved?.- Secure Sessions from Weak Secrets.- Secure Sessions from Weak Secrets.- Panel Session: Is Prool Modelling Finished?.- WAR: Wireless Anonymous Routing.- WAR: Wireless Anonymous Routing.- Limitations of IPsec Policy Mechanisms.- Limitations of IPsec Policy Mechanisms.- Deniable Authenticated Key Establishment for Internet Prools.- Deniable Authenticated Key Establishment for Internet Prools.- Prools for Supporting a Public Key Infrastructure in Ad Hoc Networks.- Prools for Supporting a Public Key Infrastructure in Ad Hoc Networks.- What We Can Learn from API Security.- Addressing New Challenges by Building Security Prools Around Graphs.- From Security Prools to Systems Security.- From Security Prools to Systems Security.- Biometrics to Enhance Smartcard Security.- Biometrics to Enhance Smartcard Security.- Blind Publication: A Copyright Library without Publication or Trust.- Blind Publication: A Copyright Library Without Publication or Trust.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews