
Security protocols
By Bruce Christianson
Subjects: Congresses, Access control, Computers, Cryptography, Computer security
Description: Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings<br />Author: Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-67381-1<br /> DOI: 10.1007/10720107<br /><br />Table of Contents:<p></p><ul><li>Keynote Address: The Changing Environment </li><li>Composing Security Properties </li><li>Auditing against Multiple Policies </li><li>Jikzi: A New Framework for Secure Publishing </li><li>Jikzi: A New Framework for Secure Publishing </li><li>Power and Permission in Security Systems </li><li>Power and Permission in Computer Systems </li><li>Auditing against Impossible Abstractions </li><li>What is Authentication? </li><li>Relations Between Secrets: The Yahalom Protocol </li><li>The Yahalom Protocol </li><li>Modelling Agents’ Knowledge Inductively </li><li>Modelling Agents’ Knowledge Inductively </li><li>Time-Lock Puzzle with Examinable Evidence of Unlocking Time </li><li>Time-Lock Puzzle with Examinable Evidence of Unlocking Time </li><li>Trust Management and Network Layer Security Protocols </li><li>Trust Management and Network Layer Security Protocols </li><li>Issues in Multicast Security </li><li>Issues in Multicast Security </li><li>Performance of Protocols</li></ul>
Comments
You must log in to leave comments.