000 | 05004nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-540-45570-7 | ||
003 | DE-He213 | ||
005 | 20240423132507.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s2000 gw | s |||| 0|eng d | ||
020 |
_a9783540455707 _9978-3-540-45570-7 |
||
024 | 7 |
_a10.1007/10720107 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aSecurity Protocols _h[electronic resource] : _b7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings / _cedited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe. |
250 | _a1st ed. 2000. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2000. |
|
300 |
_aXII, 232 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1796 |
|
505 | 0 | _aKeynote Address: The Changing Environment -- Composing Security Properties -- Auditing against Multiple Policies -- Jikzi: A New Framework for Secure Publishing -- Jikzi: A New Framework for Secure Publishing -- Power and Permission in Security Systems -- Power and Permission in Computer Systems -- Auditing against Impossible Abstractions -- What is Authentication? -- Relations Between Secrets: The Yahalom Protocol -- The Yahalom Protocol -- Modelling Agents’ Knowledge Inductively -- Modelling Agents’ Knowledge Inductively -- Time-Lock Puzzle with Examinable Evidence of Unlocking Time -- Time-Lock Puzzle with Examinable Evidence of Unlocking Time -- Trust Management and Network Layer Security Protocols -- Trust Management and Network Layer Security Protocols -- Issues in Multicast Security -- Issues in Multicast Security -- Performance of Protocols -- Performance of Protocols -- Integrity-Aware PCBC Encryption Schemes -- Integrity-Aware PCBC Encryption Schemes -- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks -- The Resurrecting Duckling -- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds -- INTERNET-MARKs -- Pictures Can’t Lie under Oath -- Pictures Can’t Lie under Oath -- Bob versus Bob – Good Guy/Bad Guy. | |
520 | _aAnother year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail. | ||
650 | 0 | _aComputer networks . | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aAlgorithms. |
650 | 2 | 4 | _aIT Operations. |
700 | 1 |
_aChristianson, Bruce. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCrispo, Bruno. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMalcolm, James A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRoe, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540673811 |
776 | 0 | 8 |
_iPrinted edition: _z9783662180037 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v1796 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/10720107 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c188364 _d188364 |