Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers / Bruce Christianson ... [et al.] (eds.)
Imprint
Berlin : Springer, c2004
Descript
viii, 241 p. : ill. ; 23 cm
CONTENT
Weak authentication: how to authenticate unknown principals without trusted parties -- Is entity authentication necessary? -- A structured operational modelling of the Dolev-YAO threat model -- On trust establishment in mobile Ad-Hoc networks -- Legally authorized and unsuthorized digital evidence -- Shrink-wrapped optimism: the DODA approach to distributed document processing -- Contractual access control -- Confidentiality levels and deliberate/indeliberate protocol attacks -- Analyzing delegation properties -- Combinatorial optimization of countermeasures against illegal copying -- Protocols with certified-transfer serves -- An architecture for an adaptive intrusion-tolerant server -- Supporting imprecise delegation in KeyNote -- Modelling protocols for secure group communications in Ad Hoc networks -- Delegation of signalling rights -- Mobile IPv6 security -- Concluding discussion: accounting for resources -- Back to the beginning