Security Protocols
Springer Berlin (Verlag)
9783540442639 (ISBN)
Keynote Address: Mobile Computing versus Immobile Security.- Experiences of Mobile IP Security.- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Thwarting Timing Attacks Using ATM Networks.- Thwarting Timing Attacks Using ATM Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- PIM Security.- PIM Security.- Merkle Puzzles Revisited - Finding Matching Elements between Lists.- Merkle Puzzles Revisited.- Encapsulating Rules of Prudent Security Engineering.- Encapsulating Rules of Prudent Security Engineering.- A Multi-OS Approach to Trusted Computer Systems.- A Multi-OS Approach to Trusted Computer Systems.- A Proof of Non-repudiation.- A Proof of Non-repudiation.- Using Authority Certificates to Create Management Structures.- Using Attribute Certificates for Creating Management Structures.- Trust Management and Whether to Delegate.- Trust Management and Whether to Delegate.- You Can't Take It with You.- Protocols Using Keys from Faulty Data.- Protocols Using Keys from Faulty Data.- On the Negotiation of Access Control Policies.- Negotiation of Access Control Policies.- Intrusion-Tolerant Group Management in Enclaves.- Lightweight Authentication in a Mobile Network.- Bluetooth Security - Fact or Fiction?.- Concluding Discussion When Does Confidentiality Harm Security?.- The Last Word.
| Erscheint lt. Verlag | 23.9.2002 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | X, 246 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 363 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • anonymity • Architecture • authentication • Bluetooth • cryptographic protocols • Data Security • denial of service • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Internet • Internet Security • IPv6 • Networks • Network Security • privacy • Secure Communications • Secure Networking • security • security protocols • Systems Security • Trust |
| ISBN-13 | 9783540442639 / 9783540442639 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich