Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / Bruce Christianson ... [et al.] (eds.).
Series: Lecture notes in computer science, 3364Publisher: Berlin ; New York : Springer, c2005Description: ix, 349 p. : ill. ; 24 cmISBN: 3540283897 (alk. paper); 9783540283898Subject(s): Computer security | Computers -- Access control | CryptographyDDC classification: 005.82,SEC Online resources: Publisher description | Table of contents only | Click here to access online| Item type | Current location | Home library | Shelving location | Call number | URL | Status | Notes | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | General Stacks | 005.82,SEC (Browse shelf) | Link to resource | Available | Almirah No.71, Shelf No.2 | MCS32747 |
Browsing Military College of Signals (MCS) shelves, Shelving location: General Stacks Close shelf browser
| 005.82,SCH Applied cryptography : | 005.82,SCH Applied cryptography : | 005.82,SCH Applied cryptography : | 005.82,SEC Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / | 005.82,STI Cryptography : | 005.82,STI Cryptography : | 005.82,STI Cryptography : |
Where have all the protocols gone? (Page-1), A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security(Page-301) Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).

Book
There are no comments on this title.