This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Security Protocols, held in Cambridge, UK, in April 2003. The 25 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Among the topics addressed are authentication, mobile ad-hoc network security, SPKI, verification of cryptographic protocols, denial of service, access control, protocol attacks, API security, biometrics for security, and others.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Security Protocols, held in Cambridge, UK, in April 2003. The 25 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Among the topics addressed are authentication, mobile ad-hoc network security, SPKI, verification of cryptographic protocols, denial of service, access control, protocol attacks, API security, biometrics for security, and others.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 2005 edition. 364 pages. 9.25x6.00x0.50 inches. In Stock. Artikel-Nr. 3540283897
Anzahl: 1 verfügbar
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was 'Where have all the Protocols gone ' Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely. Artikel-Nr. 9783540283898
Anzahl: 1 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Security Protocols | 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers | Bruce Christianson (u. a.) | Taschenbuch | Englisch | 2005 | Springer-Verlag GmbH | EAN 9783540283898 | Verantwortliche Person für die EU: Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, productsafety[at]springernature[dot]com | Anbieter: preigu. Artikel-Nr. 102280998
Anzahl: 5 verfügbar