Coverart for item
The Resource Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)

Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)

Label
Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
Title
Security protocols
Title remainder
9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
Statement of responsibility
Bruce Christianson [and others] (eds.)
Contributor
Subject
Genre
Language
eng
Member of
Additional physical form
Also available via the World Wide Web.
Cataloging source
DLC
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
S443 2002
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
2001
http://library.link/vocab/relatedWorkOrContributorName
  • Christianson, Bruce
  • International Workshop on Security Protocols
Series statement
Lecture notes in computer science
Series volume
2467
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Cryptography
Label
Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)
Instantiates
Publication
Note
Proceedings of 9th International Workshop on Security Protocols
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Mobile Computing versus Immobile Security / Roger Needham -- Experiences of Mobile IP Security / Michael Roe -- Deniel-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander -- Denial of Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis and Omer Reingold -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / Matt Blaze -- Thwarting Timing Attacks Using ATM Networks / Geraint Price -- Thwarting Timing Attacks Using ATM Networks / Geraint Price -- Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura and Silja Maki -- Towards a Survivable Security Architecture for Ad-Hoc Networks / Silja Maki -- PIM Security / Dieter Gollmann -- PIM Security / Dieter Gollmann -- Merkle Puzzles Revisited -- Finding Matching Elements between Lists / Bruce Christianson and David Wheeler -- Merkle Puzzles Revisited / Bruce Christianson -- Encapsulating Rules of Prudent Security Engineering / Jun Jurjens -- Encapsulating Rules of Prudent Security Engineering / Jan Jurjens -- A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi and Ryoichi Sasaki -- A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura -- A Proof of Non-repudiation / Giampaolo Bella and Lawrence C. Paulson -- A Proof of Non-repudiation / Larry Paulson -- Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi, Marek Sergot and Olav Bandmann -- Using Attribute Certificates for Creating Management Structures / Babak Sadighi Firozabadi -- Trust Management and Whether to Delegate / Simon N. Foley -- Trust Management and Whether to Delegate / Simon N. Foley -- You Can't Take It with You / Mark Lomas -- Protocols Using Keys from Faulty Data / David Wheeler -- Protocols Using Keys from Faulty Data / David Wheeler -- On the Negotiation of Access Control Policies / Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj and John S. Baras -- Negotiation of Access Control Policies / Virgil D. Gligor -- Intrusion-Tolerant Group Management in Enclaves / Hassen Saidi -- Lightweight Authentication in a Mobile Network / James Malcolm -- Bluetooth Security -- Fact or Fiction? / Peter Drabwell -- Concluding Discussion: When Does Confidentiality Harm Security? / Bruce Christianson -- The Last Word / Thucydides
Control code
50604923
Dimensions
24 cm
Dimensions
unknown
Extent
ix, 238 pages
Isbn
9783540442639
Isbn Type
(alk. paper)
Lccn
2002034508
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote
Label
Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers, Bruce Christianson [and others] (eds.)
Publication
Note
Proceedings of 9th International Workshop on Security Protocols
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Mobile Computing versus Immobile Security / Roger Needham -- Experiences of Mobile IP Security / Michael Roe -- Deniel-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander -- Denial of Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis and Omer Reingold -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / Matt Blaze -- Thwarting Timing Attacks Using ATM Networks / Geraint Price -- Thwarting Timing Attacks Using ATM Networks / Geraint Price -- Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura and Silja Maki -- Towards a Survivable Security Architecture for Ad-Hoc Networks / Silja Maki -- PIM Security / Dieter Gollmann -- PIM Security / Dieter Gollmann -- Merkle Puzzles Revisited -- Finding Matching Elements between Lists / Bruce Christianson and David Wheeler -- Merkle Puzzles Revisited / Bruce Christianson -- Encapsulating Rules of Prudent Security Engineering / Jun Jurjens -- Encapsulating Rules of Prudent Security Engineering / Jan Jurjens -- A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi and Ryoichi Sasaki -- A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura -- A Proof of Non-repudiation / Giampaolo Bella and Lawrence C. Paulson -- A Proof of Non-repudiation / Larry Paulson -- Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi, Marek Sergot and Olav Bandmann -- Using Attribute Certificates for Creating Management Structures / Babak Sadighi Firozabadi -- Trust Management and Whether to Delegate / Simon N. Foley -- Trust Management and Whether to Delegate / Simon N. Foley -- You Can't Take It with You / Mark Lomas -- Protocols Using Keys from Faulty Data / David Wheeler -- Protocols Using Keys from Faulty Data / David Wheeler -- On the Negotiation of Access Control Policies / Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj and John S. Baras -- Negotiation of Access Control Policies / Virgil D. Gligor -- Intrusion-Tolerant Group Management in Enclaves / Hassen Saidi -- Lightweight Authentication in a Mobile Network / James Malcolm -- Bluetooth Security -- Fact or Fiction? / Peter Drabwell -- Concluding Discussion: When Does Confidentiality Harm Security? / Bruce Christianson -- The Last Word / Thucydides
Control code
50604923
Dimensions
24 cm
Dimensions
unknown
Extent
ix, 238 pages
Isbn
9783540442639
Isbn Type
(alk. paper)
Lccn
2002034508
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Specific material designation
remote

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...