Infrastructure Security International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002 Proceedings /
Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures - both government and commercial - such as the effective prevention of, detection of, reporting of, response to and recovery...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2002.
|
Έκδοση: | 1st ed. 2002. |
Σειρά: | Lecture Notes in Computer Science,
2437 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Biometrics
- Biometric Authentication in Infrastructure Security
- Denial of Access in Biometrics-Based Authentication Systems
- Identification, Authentication, and Process
- A Novel Approach to Proactive Password Checking
- Single Sign-On Architectures
- Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information
- Analysis Process
- How to Buy Better Testing Using Competition to Get the Most Security and Robustness for Your Dollar
- Structured Risk Analysis
- A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls
- Mobile Networks
- Authentication and Authorization of Mobile Clients in Public Data Networks
- A Contemporary Foreword on GSM Security
- Vulnerability Assessment and Logs
- Vulnerability Assessment Simulation for Information Infrastructure Protection
- Pseudonymizing Unix Log Files
- System Design
- DPS: An Architectural Style for Development of Secure Software
- A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet Shopping
- Different Smartcard-Based Approaches to Physical Access Control
- Formal Methods
- Authenticity and Provability - A Formal Framework
- Protocol Engineering Applied to Formal Analysis of Security Systems
- Cryptographic Techniques
- Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
- Plausible Deniability Using Automated Linguistic Stegonagraphy
- Virtual Software Tokens - A Practical Way to Secure PKI Roaming
- Bit-Serial AOP Arithmetic Architectures over GF(2m)
- Networks
- A Practical Distributed Authorization System for GARA
- Design of a VPN Software Solution Integrating TCP and UDP Services.