AuthorInternational Workshop on Security Protocols (10th : 2002 : Cambridge, England)
TitleSecurity protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers / Bruce Christianson ... [et al.] (eds.)
Imprint Berlin : Springer, c2004
Descript viii, 241 p. : ill. ; 23 cm

CONTENT

Weak authentication: how to authenticate unknown principals without trusted parties -- Is entity authentication necessary? -- A structured operational modelling of the Dolev-YAO threat model -- On trust establishment in mobile Ad-Hoc networks -- Legally authorized and unsuthorized digital evidence -- Shrink-wrapped optimism: the DODA approach to distributed document processing -- Contractual access control -- Confidentiality levels and deliberate/indeliberate protocol attacks -- Analyzing delegation properties -- Combinatorial optimization of countermeasures against illegal copying -- Protocols with certified-transfer serves -- An architecture for an adaptive intrusion-tolerant server -- Supporting imprecise delegation in KeyNote -- Modelling protocols for secure group communications in Ad Hoc networks -- Delegation of signalling rights -- Mobile IPv6 security -- Concluding discussion: accounting for resources -- Back to the beginning


SUBJECT

  1. Computer security -- Congresses
  2. Computers -- Access control -- Congresses
  3. Cryptography -- Congresses

LOCATIONCALL#STATUS
Central Library (4th Floor)005.8 I61S 2002 CHECK SHELVES