Sold Out
Book Categories |
Where have all the protocols gone? | 1 | |
A protocol's life after attacks | 3 | |
Discussion | 11 | |
Towards flexible credential negotiation protocols | 19 | |
Discussion | 24 | |
Man-in-the-middle in tunnelled authentication protocols | 28 | |
Discussion | 42 | |
Towards a framework for autonomic security protocols | 49 | |
Discussion | 55 | |
Client v. server side protocols, interfaces and storage | 63 | |
Discussion | 74 | |
Guaranteeing access in spite of distributed service-flooding attacks | 80 | |
Discussion | 97 | |
Protocol codesign | 106 | |
Discussion | 114 | |
Enforcing security policies for distributed objects applications | 119 | |
Discussion | 131 | |
Regular SPKI | 134 | |
Discussion | 151 | |
Federated identity-management protocols | 153 | |
Discussion | 175 | |
Enforcing the unenforceable | 178 | |
Is the verification problem for cryptographic protocols solved? | 183 | |
Secure sessions from weak secrets | 190 | |
Discussion | 206 | |
Panel session : is protocol modelling finished? | 213 | |
WAR : wireless anonymous routing | 218 | |
Discussion | 233 | |
Limitations of IPsec policy mechanisms | 241 | |
Discussion | 252 | |
Deniable authenticated key establishment for Internet protocols | 255 | |
Discussion | 272 | |
Protocols for supporting a public key infrastructure in ad hoc networks | 274 | |
Discussion | 283 | |
What we can learn from API security | 288 | |
Addressing new challenges by building security protocols around graphs | 301 | |
From security protocols to system security | 307 | |
Discussion | 323 | |
Biometrics to enhance smartcard security | 324 | |
Discussion | 333 | |
Blind publication : a copyright library without publication or trust | 336 | |
Discussion | 341 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecurity Protocols
X
This Item is in Your InventorySecurity Protocols
X
You must be logged in to review the productsX
X
X
Add Security Protocols, This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Prools, held in Cambridge, UK, in April 2002. The 16 revised full papers presented together with transcriptions of the discussions following t, Security Protocols to the inventory that you are selling on WonderClubX
X
Add Security Protocols, This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Prools, held in Cambridge, UK, in April 2002. The 16 revised full papers presented together with transcriptions of the discussions following t, Security Protocols to your collection on WonderClub |