Coverart for item
The Resource Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers, Bruce Christianson [and others] (eds.)

Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers, Bruce Christianson [and others] (eds.)

Label
Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
Title
Security protocols
Title remainder
8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
Statement of responsibility
Bruce Christianson [and others] (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Security Protocols held in Cambridge, UK in April 2000. The 21 papers presented with transcriptions of the discussion following the presentation have gone through two rounds of revision and selection; also included are a keynote address and a discussion summary and an afterword by the volume editors. Among the topics addressed are authentication, trust in cyberspace, identification protocols, administration and government issues, specification, access privileges, PKI certificates, trust-based billing systems, public-key cryptosystems, denial of service, anonymous auction protocols, and certification
Member of
Cataloging source
CUT
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
S44 2001eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2000
http://bibfra.me/vocab/lite/meetingName
International Workshop on Security Protocols
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Christianson, Bruce
  • LINK (Online service)
Series statement
  • Lecture notes in computer science
  • Lecture notes in computer science. Lecture notes in artificial intelligence
Series volume
2133
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Cryptography
  • Sécurité informatique
  • Ordinateurs
  • Cryptographie
  • Computer security
  • Computers
  • Cryptography
  • Authentifikation
  • Datensicherung
  • Kommunikationsprotokoll
  • Kryptologie
  • Gegevens
  • Databanken
  • Geheimschrift
  • Beveiliging
  • Systèmes informatiques
  • Cryptographie
  • Cambridge <2001>
Label
Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers, Bruce Christianson [and others] (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers and Principals -- Authentication and Naming -- Users and Trust in Cyberspace -- Users and Trust in Cyberspace -- Interactive Identification Protocols -- Open Questions -- Looking on the Bright Side of Black-Box Cryptography -- Government Access to Keys -- Panel Discussion -- Making Sense of Specifications: The Formalization of SET -- Making Sense of Specifications: The Formalization of SET -- Lack of Explicitness Strikes Back -- Lack of Explicitness Strikes Back -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- The Correctness of Crypto Transaction Sets -- The Correctness of Crypto Transaction Sets -- Micro-management of Risk in a Trust-Based Billing System -- Broadening the Scope of Fault Tolerance within Secure Services -- Broadening the Scope of Fault Tolerance within Secure Services -- DOS-Resistant Authentication with Client Puzzles -- DOS-Resistant Authentication with Client Puzzles -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Denial of Service -- Panel Discussion -- The Resurrecting Duckling -- What Next? -- The Resurrecting Duckling -- What Next? -- An Anonymous Auction Protocol Using "Money Escrow" -- Short Certification of Secure RSA Modulus -- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks -- A Practical Analysis -- -- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks -- A Practical Analysis -- -- I Cannot Tell a Lie -- Afterward
Control code
213934203
Dimensions
unknown
Extent
1 online resource (viii, 255 pages)
Form of item
online
Isbn
9783540425663
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9783540425663
  • 10.1007/3-540-44810-1
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)213934203
Label
Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers, Bruce Christianson [and others] (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers and Principals -- Authentication and Naming -- Users and Trust in Cyberspace -- Users and Trust in Cyberspace -- Interactive Identification Protocols -- Open Questions -- Looking on the Bright Side of Black-Box Cryptography -- Government Access to Keys -- Panel Discussion -- Making Sense of Specifications: The Formalization of SET -- Making Sense of Specifications: The Formalization of SET -- Lack of Explicitness Strikes Back -- Lack of Explicitness Strikes Back -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- Review and Revocation of Access Privileges Distributed with PKI Certificates -- The Correctness of Crypto Transaction Sets -- The Correctness of Crypto Transaction Sets -- Micro-management of Risk in a Trust-Based Billing System -- Broadening the Scope of Fault Tolerance within Secure Services -- Broadening the Scope of Fault Tolerance within Secure Services -- DOS-Resistant Authentication with Client Puzzles -- DOS-Resistant Authentication with Client Puzzles -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms -- Denial of Service -- Panel Discussion -- The Resurrecting Duckling -- What Next? -- The Resurrecting Duckling -- What Next? -- An Anonymous Auction Protocol Using "Money Escrow" -- Short Certification of Secure RSA Modulus -- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks -- A Practical Analysis -- -- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks -- A Practical Analysis -- -- I Cannot Tell a Lie -- Afterward
Control code
213934203
Dimensions
unknown
Extent
1 online resource (viii, 255 pages)
Form of item
online
Isbn
9783540425663
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9783540425663
  • 10.1007/3-540-44810-1
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)213934203

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...