Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applicatio...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Christianson, Bruce (Επιμελητής έκδοσης), Crispo, Bruno (Επιμελητής έκδοσης), Malcolm, James A. (Επιμελητής έκδοσης), Roe, Michael (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3364
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Where Have All the Protocols Gone?
  • A Protocol’s Life After Attacks...
  • A Protocol’s Life After Attacks...
  • Towards Flexible Credential Negotiation Protocols
  • Towards Flexible Credential Negotiation Protocols
  • Man-in-the-Middle in Tunnelled Authentication Protocols
  • Man-in-the-Middle in Tunnelled Authentication Protocols
  • Towards a Framework for Autonomic Security Protocols
  • Towards a Framework for Autonomic Security Protocols
  • Client v. Server Side Protocols, Interfaces and Storage
  • Client v. Server Side Protocols, Interfaces and Storage
  • Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
  • Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
  • Protocol Codesign
  • Protocol Codesign
  • Enforcing Security Policies for Distributed Objects Applications
  • Enforcing Security Policies for Distributed Objects Applications
  • Regular SPKI
  • Regular SPKI
  • Federated Identity-Management Protocols
  • Federated Identity-Management Protocols
  • Enforcing the Unenforceable
  • Is the Verification Problem for Cryptographic Protocols Solved?
  • Secure Sessions from Weak Secrets
  • Secure Sessions from Weak Secrets
  • Panel Session: Is Protocol Modelling Finished?
  • WAR: Wireless Anonymous Routing
  • WAR: Wireless Anonymous Routing
  • Limitations of IPsec Policy Mechanisms
  • Limitations of IPsec Policy Mechanisms
  • Deniable Authenticated Key Establishment for Internet Protocols
  • Deniable Authenticated Key Establishment for Internet Protocols
  • Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
  • Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
  • What We Can Learn from API Security
  • Addressing New Challenges by Building Security Protocols Around Graphs
  • From Security Protocols to Systems Security
  • From Security Protocols to Systems Security
  • Biometrics to Enhance Smartcard Security
  • Biometrics to Enhance Smartcard Security
  • Blind Publication: A Copyright Library without Publication or Trust
  • Blind Publication: A Copyright Library Without Publication or Trust.