|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Bruce Christianson , Bruno Crispo , James A. Malcolm , Michael RoePublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2004 ed. Volume: 2845 Dimensions: Width: 15.50cm , Height: 1.30cm , Length: 23.50cm Weight: 0.800kg ISBN: 9783540208303ISBN 10: 3540208305 Pages: 248 Publication Date: 13 January 2004 Audience: College/higher education , General/trade , Tertiary & Higher Education , General Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of Contents(Transcript).- Keynote Address.- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.- Is Entity Authentication Necessary?.- A Structured Operational Modelling of the Dolev-Yao Threat Model.- On Trust Establishment in Mobile Ad-Hoc Networks.- Legally Authorized and Unauthorized Digital Evidence.- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing.- Contractual Access Control.- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.- Analyzing Delegation Properties.- Combinatorial Optimization of Countermeasures against Illegal Copying.- Protocols with Certified-Transfer Servers.- An Architecture for an Adaptive Intrusion-Tolerant Server.- Supporting Imprecise Delegation in KeyNote.- Modeling Protocols for Secure Group Communications in Ad Hoc Networks.- Delegation of Signalling Rights.- Mobile IPv6 Security.- Concluding Discussion: Accounting for Resources.- Back to the Beginning.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |