Security protocols

Security protocols

By Bruce Christianson

Subjects: Congresses, Access control, Computers, Cryptography, Computer security

Description: Security Protocols: 8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers<br />Author: Bruce Christianson, James A. Malcolm, Bruno Crispo, Michael Roe<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-42566-3<br /> DOI: 10.1007/3-540-44810-1<br /><br />Table of Contents:<p></p><ul><li>Keynote Address: Security Protocols and the Swiss Army Knife </li><li>Mergers and Principals </li><li>Mergers and Principals </li><li>Authentication and Naming </li><li>Users and Trust in Cyberspace </li><li>Users and Trust in Cyberspace </li><li>Interactive Identification Protocols </li><li>Open Questions </li><li>Looking on the Bright Side of Black-Box Cryptography </li><li>Government Access to Keys - Panel Discussion </li><li>Making Sense of Specifications: The Formalization of SET </li><li>Making Sense of Specifications: The Formalization of SET </li><li>Lack of Explicitness Strikes Back </li><li>Lack of Explicitness Strikes Back </li><li>Review and Revocation of Access Privileges Distributed with PKI Certificates </li><li>Review and Revocation of Access Privileges Distributed with PKI Certificates </li><li>The Correctness of Crypto Transaction Sets </li><li>The Correctness of Crypto Transaction Sets </li><li>Micro-management of Risk in a Trust-Based Billing System </li><li>Broadening the Scope of Fault Tolerance within Secure Services</li></ul>

Comments

You must log in to leave comments.

Ratings

Latest ratings