<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Security protocols</title>
    <subTitle>11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Christianson, Bruce.</namePart>
  </name>
  <typeOfResource/>
  <originInfo>
    <place>
      <placeTerm type="text">Berlin</placeTerm>
    </place>
    <place>
      <placeTerm type="text">New York</placeTerm>
    </place>
    <publisher>Springer</publisher>
    <dateIssued>c2005</dateIssued>
    <issuance/>
  </originInfo>
  <physicalDescription>
    <extent>ix, 349 p. : ill. ; 24 cm.</extent>
  </physicalDescription>
  <tableOfContents>Where have all the protocols gone? (Page-1), A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190),    Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security(Page-301)  Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).</tableOfContents>
  <note type="statement of responsibility">Bruce Christianson ... [et al.] (eds.).</note>
  <subject authority="lcsh">
    <topic>Computer security</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computers</topic>
    <topic>Access control</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Cryptography</topic>
  </subject>
  <classification authority="ddc">005.82,SEC</classification>
  <relatedItem type="series">
    <titleInfo>
      <title>Lecture notes in computer science, 3364</title>
    </titleInfo>
  </relatedItem>
  <identifier type="isbn">3540283897 (alk. paper)</identifier>
  <identifier type="isbn">9783540283898</identifier>
  <identifier type="lccn">2005931713</identifier>
  <identifier type="uri">http://www.loc.gov/catdir/enhancements/fy0663/2005931713-d.html</identifier>
  <identifier type="uri">http://www.loc.gov/catdir/toc/fy0609/2005931713.html</identifier>
  <identifier type="uri">http://springerlink.metapress.com/openurl.asp?genre=issue&amp;issn=0302-9743&amp;volume=3364</identifier>
  <location>
    <url displayLabel="Publisher description">http://www.loc.gov/catdir/enhancements/fy0663/2005931713-d.html</url>
  </location>
  <location>
    <url displayLabel="Table of contents only">http://www.loc.gov/catdir/toc/fy0609/2005931713.html</url>
  </location>
  <location>
    <url>http://springerlink.metapress.com/openurl.asp?genre=issue&amp;issn=0302-9743&amp;volume=3364</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordChangeDate encoding="iso8601">20230216114629.0</recordChangeDate>
  </recordInfo>
</mods>
