Coverart for item
The Resource Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)

Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)

Label
Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
Title
Security protocols
Title remainder
9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
Statement of responsibility
Bruce Christianson [and others] (eds.)
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Security Protocols held in Cambridge, UK in April 2001. The 13 revised full papers presented together with transcriptions of the discussions following the presentations have gone through two rounds of reviewing, revision, and selection. Also included are abstracts and transcriptions of invited presentations and topically focused discussions. Among the topics addressed are mobile computing and security, denial of service, authentication, Internet protocols, timing attacks, PIM security, security engineering, non-repudiation, trust management, access control policies, and Bluetooth security
Member of
Cataloging source
COO
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
S443 2002
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
2001
http://library.link/vocab/relatedWorkOrContributorName
  • Christianson, Bruce
  • International Workshop on Security Protocols
Series statement
Lecture notes in computer science
Series volume
2467
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Cryptography
  • Computer security
  • Computers
  • Cryptography
  • Gegevens
  • Databanken
  • Cryptografie
  • Beveiliging
Label
Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)
Instantiates
Publication
Note
Proceedings of 9th International Workshop on Security Protocols
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security -- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World -- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Thwarting Timing Attacks Using ATM Networks -- Thwarting Timing Attacks Using ATM Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- PIM Security -- PIM Security -- Merkle Puzzles Revisited -- Finding Matching Elements between Lists -- Merkle Puzzles Revisited -- Encapsulating Rules of Prudent Security Engineering -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A Multi-OS Approach to Trusted Computer Systems -- A Proof of Non-repudiation -- A Proof of Non-repudiation -- Using Authority Certificates to Create Management Structures -- Using Attribute Certificates for Creating Management Structures -- Trust Management and Whether to Delegate -- Trust Management and Whether to Delegate -- You Can't Take It with You -- Protocols Using Keys from Faulty Data -- Protocols Using Keys from Faulty Data -- On the Negotiation of Access Control Policies -- Negotiation of Access Control Policies -- Intrusion-Tolerant Group Management in Enclaves -- Lightweight Authentication in a Mobile Network -- Bluetooth Security -- Fact or Fiction? -- Concluding Discussion When Does Confidentiality Harm Security? -- The Last Word
Control code
50707538
Dimensions
unknown
Extent
1 online resource (ix, 238 pages).
Form of item
online
Isbn
9783540458074
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-45807-7
Specific material designation
remote
System control number
(OCoLC)50707538
Label
Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)
Publication
Note
Proceedings of 9th International Workshop on Security Protocols
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Keynote Address: Mobile Computing versus Immobile Security -- Experiences of Mobile IP Security -- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World -- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols -- Thwarting Timing Attacks Using ATM Networks -- Thwarting Timing Attacks Using ATM Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- Towards a Survivable Security Architecture for Ad-Hoc Networks -- PIM Security -- PIM Security -- Merkle Puzzles Revisited -- Finding Matching Elements between Lists -- Merkle Puzzles Revisited -- Encapsulating Rules of Prudent Security Engineering -- Encapsulating Rules of Prudent Security Engineering -- A Multi-OS Approach to Trusted Computer Systems -- A Multi-OS Approach to Trusted Computer Systems -- A Proof of Non-repudiation -- A Proof of Non-repudiation -- Using Authority Certificates to Create Management Structures -- Using Attribute Certificates for Creating Management Structures -- Trust Management and Whether to Delegate -- Trust Management and Whether to Delegate -- You Can't Take It with You -- Protocols Using Keys from Faulty Data -- Protocols Using Keys from Faulty Data -- On the Negotiation of Access Control Policies -- Negotiation of Access Control Policies -- Intrusion-Tolerant Group Management in Enclaves -- Lightweight Authentication in a Mobile Network -- Bluetooth Security -- Fact or Fiction? -- Concluding Discussion When Does Confidentiality Harm Security? -- The Last Word
Control code
50707538
Dimensions
unknown
Extent
1 online resource (ix, 238 pages).
Form of item
online
Isbn
9783540458074
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-45807-7
Specific material designation
remote
System control number
(OCoLC)50707538

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...