|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Rainer BaumgartPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 1999 ed. Volume: 1740 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 0.860kg ISBN: 9783540668008ISBN 10: 3540668004 Pages: 266 Publication Date: 22 November 1999 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsRisk Management.- Developing Electronic Trust Policies Using a Risk Management Model.- Security Design.- SECURE: A Simulation Tool for PKI Design.- Lazy Infinite-State Analysis of Security Protocols.- Electronic Payment.- Electronic Payments: Where Do We Go from Here?.- SmartCard Issues.- PCA: Jini-based Personal Card Assistant.- An X.509-Compatible Syntax for Compact Certificates.- Applications.- Secure and Cost Efficient Electronic Stamps.- Implementation of a Digital Lottery Server on WWW.- PKI-experiences (Workshop Notes).- Cert'eM: Certification System Based on Electronic Mail Service Structure.- A Method for Developing Public Key Infrastructure Models.- The Realities of PKI Inter-operability.- Mobile Security.- Mobile Security - An Overview of GSM, SAT and WAP.- Secure Transport of Authentication Data in Third Generation Mobile Phone Networks.- Cryptography.- Extending Wiener's Attack in the Presence of Many Decrypting Exponents.- Improving the Exact Security of Fiat-Shamir Signature Schemes.- Network Security (Workshop Notes).- On Privacy Issues of Internet Access Services via Proxy Servers.- Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2).- Key Recovery.- Auto-recoverable Auto-certifiable Cryptosystems.- Intrusion Detection.- A Distributed Intrusion Detection System Based on Bayesian Alarm Networks.- Interoperability.- Interoperability Characteristics of S/MIME Products.- The DEDICA Project: The Solution to the Interoperability Problems between the X.509 and EDIFACT Public Key Infrastructures.- Biometrics.- Multiresolution Analysis and Geometric Measures for Biometric Identification Systems.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |