Security Protocols 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers /

The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don't insist they rela...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Christianson, Bruce (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Crispo, Bruno (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Malcolm, James A. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Roe, Michael (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2001.
Έκδοση:1st ed. 2001.
Σειρά:Lecture Notes in Computer Science, 2133
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Keynote Address: Security Protocols and the Swiss Army Knife
  • Mergers and Principals
  • Mergers and Principals
  • Authentication and Naming
  • Users and Trust in Cyberspace
  • Users and Trust in Cyberspace
  • Interactive Identification Protocols
  • Open Questions
  • Looking on the Bright Side of Black-Box Cryptography
  • Government Access to Keys - Panel Discussion
  • Making Sense of Specifications: The Formalization of SET
  • Making Sense of Specifications: The Formalization of SET
  • Lack of Explicitness Strikes Back
  • Lack of Explicitness Strikes Back
  • Review and Revocation of Access Privileges Distributed with PKI Certificates
  • Review and Revocation of Access Privileges Distributed with PKI Certificates
  • The Correctness of Crypto Transaction Sets
  • The Correctness of Crypto Transaction Sets
  • Micro-management of Risk in a Trust-Based Billing System
  • Broadening the Scope of Fault Tolerance within Secure Services
  • Broadening the Scope of Fault Tolerance within Secure Services
  • DOS-Resistant Authentication with Client Puzzles
  • DOS-Resistant Authentication with Client Puzzles
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms
  • Denial of Service - Panel Discussion
  • The Resurrecting Duckling - What Next?
  • The Resurrecting Duckling - What Next?
  • An Anonymous Auction Protocol Using "Money Escrow"
  • Short Certification of Secure RSA Modulus
  • Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis -
  • Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis -
  • I Cannot Tell a Lie
  • Afterward.