Security Protocols 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers /
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don't insist they rela...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2001.
|
Έκδοση: | 1st ed. 2001. |
Σειρά: | Lecture Notes in Computer Science,
2133 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Address: Security Protocols and the Swiss Army Knife
- Mergers and Principals
- Mergers and Principals
- Authentication and Naming
- Users and Trust in Cyberspace
- Users and Trust in Cyberspace
- Interactive Identification Protocols
- Open Questions
- Looking on the Bright Side of Black-Box Cryptography
- Government Access to Keys - Panel Discussion
- Making Sense of Specifications: The Formalization of SET
- Making Sense of Specifications: The Formalization of SET
- Lack of Explicitness Strikes Back
- Lack of Explicitness Strikes Back
- Review and Revocation of Access Privileges Distributed with PKI Certificates
- Review and Revocation of Access Privileges Distributed with PKI Certificates
- The Correctness of Crypto Transaction Sets
- The Correctness of Crypto Transaction Sets
- Micro-management of Risk in a Trust-Based Billing System
- Broadening the Scope of Fault Tolerance within Secure Services
- Broadening the Scope of Fault Tolerance within Secure Services
- DOS-Resistant Authentication with Client Puzzles
- DOS-Resistant Authentication with Client Puzzles
- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms
- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms
- Denial of Service - Panel Discussion
- The Resurrecting Duckling - What Next?
- The Resurrecting Duckling - What Next?
- An Anonymous Auction Protocol Using "Money Escrow"
- Short Certification of Secure RSA Modulus
- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis -
- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis -
- I Cannot Tell a Lie
- Afterward.