Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
Resource Information
The work Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers represents a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Work, Language Material, Books, http://bibfra.me/vocab/marc/conference-publication.
The Resource
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
Resource Information
The work Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers represents a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Work, Language Material, Books, http://bibfra.me/vocab/marc/conference-publication.
- Label
- Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
- Title remainder
- 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
- Statement of responsibility
- Bruce Christianson [and others] (eds.)
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography -- Congresses
- IP
- Informatique
- Kongress
- Mobile Computing
- Mobilfunk
- Protocole de sécurité
- Sicherheitsprotokoll
- Sécurité informatique
- Telekommunikationsnetz
- Authentifikation
- Language
- eng
- Summary
- Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion, openupnewlinesofinvestigation, and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I574 2005eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- Lecture notes in computer science,
- Series volume
- 3364
Context
Context of Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papersWork of
No resources found
No enriched resources found
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/LbJcXlzydbQ/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/LbJcXlzydbQ/">Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Work Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/LbJcXlzydbQ/" typeof="CreativeWork http://bibfra.me/vocab/lite/Work"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/LbJcXlzydbQ/">Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>