Check nearby libraries
Buy this book
Security Protocols: 8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers
Author: Bruce Christianson, James A. Malcolm, Bruno Crispo, Michael Roe
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42566-3
DOI: 10.1007/3-540-44810-1
Table of Contents:
- Keynote Address: Security Protocols and the Swiss Army Knife
- Mergers and Principals
- Mergers and Principals
- Authentication and Naming
- Users and Trust in Cyberspace
- Users and Trust in Cyberspace
- Interactive Identification Protocols
- Open Questions
- Looking on the Bright Side of Black-Box Cryptography
- Government Access to Keys - Panel Discussion
- Making Sense of Specifications: The Formalization of SET
- Making Sense of Specifications: The Formalization of SET
- Lack of Explicitness Strikes Back
- Lack of Explicitness Strikes Back
- Review and Revocation of Access Privileges Distributed with PKI Certificates
- Review and Revocation of Access Privileges Distributed with PKI Certificates
- The Correctness of Crypto Transaction Sets
- The Correctness of Crypto Transaction Sets
- Micro-management of Risk in a Trust-Based Billing System
- Broadening the Scope of Fault Tolerance within Secure Services
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Computers, Congresses, Computer security, Cryptography, Access controlEdition | Availability |
---|---|
1
Security Protocols: 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers (Lecture Notes in Computer Science)
October 25, 2001, Springer
Paperback
in English
- 1 edition
3540425667 9783540425663
|
aaaa
|
Book Details
First Sentence
"The term 'principal' figures prominently in discussions about distributed system security, in particular in the context of authentication."
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?October 20, 2023 | Edited by ImportBot | import existing book |
July 28, 2014 | Created by ImportBot | import new book |