|
![]() |
|||
|
||||
OverviewThis book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Security Protocols held in Cambridge, UK, in April 1999.The 20 revised contributions presented as position statements are followed by transcripts of the discussions between the authors and the audience; thus the volume reflects the lively interaction at the workshop. All relevant aspects of current research and development in the area are addressed. Full Product DetailsAuthor: Bruce Christianson , Bruno Crispo , James A. Malcolm , Michael RoePublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2000 ed. Volume: 1796 Dimensions: Width: 15.50cm , Height: 1.30cm , Length: 23.30cm Weight: 0.780kg ISBN: 9783540673811ISBN 10: 3540673814 Pages: 232 Publication Date: 12 April 2000 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsKeynote Address: The Changing Environment.- Composing Security Properties.- Auditing against Multiple Policies.- Jikzi: A New Framework for Secure Publishing.- Jikzi: A New Framework for Secure Publishing.- Power and Permission in Security Systems.- Power and Permission in Computer Systems.- Auditing against Impossible Abstractions.- What is Authentication?.- Relations Between Secrets: The Yahalom Protocol.- The Yahalom Protocol.- Modelling Agents' Knowledge Inductively.- Modelling Agents' Knowledge Inductively.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Time-Lock Puzzle with Examinable Evidence of Unlocking Time.- Trust Management and Network Layer Security Protocols.- Trust Management and Network Layer Security Protocols.- Issues in Multicast Security.- Issues in Multicast Security.- Performance of Protocols.- Performance of Protocols.- Integrity-Aware PCBC Encryption Schemes.- Integrity-Aware PCBC Encryption Schemes.- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks.- The Resurrecting Duckling.- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds.- INTERNET-MARKs.- Pictures Can't Lie under Oath.- Pictures Can't Lie under Oath.- Bob versus Bob - Good Guy/Bad Guy.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |