Security Protocols
Springer Berlin (Verlag)
978-3-540-20830-3 (ISBN)
(Transcript).- Keynote Address.- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties.- Is Entity Authentication Necessary?.- A Structured Operational Modelling of the Dolev-Yao Threat Model.- On Trust Establishment in Mobile Ad-Hoc Networks.- Legally Authorized and Unauthorized Digital Evidence.- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing.- Contractual Access Control.- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.- Analyzing Delegation Properties.- Combinatorial Optimization of Countermeasures against Illegal Copying.- Protocols with Certified-Transfer Servers.- An Architecture for an Adaptive Intrusion-Tolerant Server.- Supporting Imprecise Delegation in KeyNote.- Modeling Protocols for Secure Group Communications in Ad Hoc Networks.- Delegation of Signalling Rights.- Mobile IPv6 Security.- Concluding Discussion: Accounting for Resources.- Back to the Beginning.
Erscheint lt. Verlag | 13.1.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | VIII, 248 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 400 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • Algorithmen • authentication • Bridge • Communication • cryptographic protocols • Delegation • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Internet Security • IPv6 • Kryptographie / Kryptologie • Mobile Security • Network Security • privacy • protocol attacks • Secure Communications • secure group communications • security • security protocols |
ISBN-10 | 3-540-20830-5 / 3540208305 |
ISBN-13 | 978-3-540-20830-3 / 9783540208303 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich