Security Protocols (eBook, PDF)
13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Redaktion: Christianson, Bruce; Roe, Michael; Malcom, James A.; Crispo, Bruno
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Security Protocols (eBook, PDF)
13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Redaktion: Christianson, Bruce; Roe, Michael; Malcom, James A.; Crispo, Bruno
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. There are 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, and access control.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 5.37MB
Andere Kunden interessierten sich auch für
- Security Protocols (eBook, PDF)40,95 €
- Security Protocols (eBook, PDF)40,95 €
- Information and Communications Security (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
- Security in Communication Networks (eBook, PDF)40,95 €
- Security Protocols (eBook, PDF)40,95 €
- Security and Privacy in Ad-hoc and Sensor Networks (eBook, PDF)40,95 €
-
-
-
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. There are 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, and access control.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 350
- Erscheinungstermin: 15. November 2007
- Englisch
- ISBN-13: 9783540771562
- Artikelnr.: 44128074
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 350
- Erscheinungstermin: 15. November 2007
- Englisch
- ISBN-13: 9783540771562
- Artikelnr.: 44128074
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
The System Likes You.- Experiences with Host-to-Host IPsec.- Experiences with Host-to-Host IPsec.- Repairing the Bluetooth Pairing Protocol.- Repairing the Bluetooth Pairing Protocol.- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.- Keep on Blockin' in the Free World.- PIN (and Chip) or Signature: Beating the Cheating?.- PIN (and Chip) or Signature: Beating the Cheating?.- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Authorisation Subterfuge by Delegation in Decentralised Networks.- Authorisation Subterfuge by Delegation in Decentralised Networks.- Multi-channel Protocols.- Multi-channel Protocols.- Combining Crypto with Biometrics: A New Human-Security Interface.- User-Friendly Grid Security Architecture and Protocols.- User-Friendly Grid Security Architecture and Protocols.- Countering Automated Exploits with System Security CAPTCHAS.- Countering Automated Exploits with System Security CAPTCHAS.- The System Likes You?.- Enhancing Privacy with Shared Pseudo Random Sequences.- Enhancing Privacy with Shared Pseudo Random Sequences.- Non-repudiation and the Metaphysics of Presence.- Non-repudiation and the Metaphysics of Presence.- Understanding Why Some Network Protocols Are User-Unfriendly.- Understanding Why Some Network Protocols Are User-Unfriendly.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Listen Too Closely and You May Be Confused.- Listen Too Closely and You May Be Confused.- The Dining Freemasons (Security Protocols for Secret Societies).-The Dining Freemasons (Security Protocols for Secret Societies).- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).- Safer Scripting Through Precompilation.- Safer Scripting Through Precompilation.- Implementing a Multi-hat PDA.- Implementing a Multi-hat PDA.- Anonymous Context Based Role Activation Mechanism.- Anonymous Context Based Role Activation Mechanism.- Topology of Covert Conflict.- The Initial Costs and Maintenance Costs of Protocols.- The Initial Costs and Maintenance Costs of Protocols.- Alice and Bob.
The System Likes You.- Experiences with Host-to-Host IPsec.- Experiences with Host-to-Host IPsec.- Repairing the Bluetooth Pairing Protocol.- Repairing the Bluetooth Pairing Protocol.- Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.- Keep on Blockin' in the Free World.- PIN (and Chip) or Signature: Beating the Cheating?.- PIN (and Chip) or Signature: Beating the Cheating?.- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).- Authorisation Subterfuge by Delegation in Decentralised Networks.- Authorisation Subterfuge by Delegation in Decentralised Networks.- Multi-channel Protocols.- Multi-channel Protocols.- Combining Crypto with Biometrics: A New Human-Security Interface.- User-Friendly Grid Security Architecture and Protocols.- User-Friendly Grid Security Architecture and Protocols.- Countering Automated Exploits with System Security CAPTCHAS.- Countering Automated Exploits with System Security CAPTCHAS.- The System Likes You?.- Enhancing Privacy with Shared Pseudo Random Sequences.- Enhancing Privacy with Shared Pseudo Random Sequences.- Non-repudiation and the Metaphysics of Presence.- Non-repudiation and the Metaphysics of Presence.- Understanding Why Some Network Protocols Are User-Unfriendly.- Understanding Why Some Network Protocols Are User-Unfriendly.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.- Listen Too Closely and You May Be Confused.- Listen Too Closely and You May Be Confused.- The Dining Freemasons (Security Protocols for Secret Societies).-The Dining Freemasons (Security Protocols for Secret Societies).- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike).- Safer Scripting Through Precompilation.- Safer Scripting Through Precompilation.- Implementing a Multi-hat PDA.- Implementing a Multi-hat PDA.- Anonymous Context Based Role Activation Mechanism.- Anonymous Context Based Role Activation Mechanism.- Topology of Covert Conflict.- The Initial Costs and Maintenance Costs of Protocols.- The Initial Costs and Maintenance Costs of Protocols.- Alice and Bob.