Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings /
Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly,...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2000.
|
Έκδοση: | 1st ed. 2000. |
Σειρά: | Lecture Notes in Computer Science,
1796 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Keynote Address: The Changing Environment
- Composing Security Properties
- Auditing against Multiple Policies
- Jikzi: A New Framework for Secure Publishing
- Jikzi: A New Framework for Secure Publishing
- Power and Permission in Security Systems
- Power and Permission in Computer Systems
- Auditing against Impossible Abstractions
- What is Authentication?
- Relations Between Secrets: The Yahalom Protocol
- The Yahalom Protocol
- Modelling Agents' Knowledge Inductively
- Modelling Agents' Knowledge Inductively
- Time-Lock Puzzle with Examinable Evidence of Unlocking Time
- Time-Lock Puzzle with Examinable Evidence of Unlocking Time
- Trust Management and Network Layer Security Protocols
- Trust Management and Network Layer Security Protocols
- Issues in Multicast Security
- Issues in Multicast Security
- Performance of Protocols
- Performance of Protocols
- Integrity-Aware PCBC Encryption Schemes
- Integrity-Aware PCBC Encryption Schemes
- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
- The Resurrecting Duckling
- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds
- INTERNET-MARKs
- Pictures Can't Lie under Oath
- Pictures Can't Lie under Oath
- Bob versus Bob - Good Guy/Bad Guy.