Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers / Bruce Christianson ... [et al.] (eds.).

Contributor(s): Christianson, BruceSeries: Lecture notes in computer science, 3364Publisher: Berlin ; New York : Springer, c2005Description: ix, 349 p. : ill. ; 24 cmISBN: 3540283897 (alk. paper); 9783540283898Subject(s): Computer security | Computers -- Access control | CryptographyDDC classification: 005.82,SEC Online resources: Publisher description | Table of contents only | Click here to access online
Contents:
Where have all the protocols gone? (Page-1), A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security(Page-301) Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.82,SEC (Browse shelf) Link to resource Available Almirah No.71, Shelf No.2 MCS32747
Total holds: 0

Where have all the protocols gone? (Page-1), A protocol's life after attacks (Page-3), Towards flexible credential negotiation protocols (Page-19), Man-in-the-middle in tunnelled authentication protocols (Page-28), Towards a framework for autonomic security protocols (Page-49), Client v. server side protocols, interfaces and storage (Page-63), Guaranteeing access in spite of distributed service-flooding attacks Protocol codesign (Page-106), Enforcing security policies for distributed objects applications (Page-119), Regular SPKI (Page-134), Federated identity-management protocols (Page-153), Enforcing the unenforceable (Page-178), Is the verification problem for cryptographic protocols solved? (Page-183), Secure sessions from weak secrets (Page-190), Panel session : is protocol modelling finished? (Page-213), WAR : wireless anonymous routing (Page-218), Limitations of IPsec policy mechanisms (Page-241), Deniable authenticated key establishment for Internet protocols (Page-255), Protocols for supporting a public key infrastructure in ad hoc networks (Page-274), What we can learn from API security (Page-288), Addressing new challenges by building security protocols around graphs From security protocols to system security(Page-301) Biometrics to enhance smartcard security (Page-324), Blind publication : a copyright library without publication or trust (Page-336).

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.