000 | 00631nam a2200181Ia 4500 | ||
---|---|---|---|
999 |
_c5891 _d5891 |
||
008 | 161214s9999 xx 000 0 und d | ||
020 |
_a3540208305 _cpbk |
||
082 |
_a004 _bCHR |
||
100 | _aChristianson, Bruce | ||
245 | 0 | _aSecurity Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers | |
260 |
_aBerlin: _bSpringer, _c2004 |
||
300 |
_aviii, 241 p.; _bill., index: _c24 cm. |
||
365 |
_aINR _b2356.20/ EURO 42.00 |
||
440 | _v2845 | ||
490 | _aLecture notes in computer science | ||
520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Protocols, held in Cambridge, UK, in April 2002. The 16 revised full papers presented together with transcriptions of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Also included are abstracts and summaries of an introduction and a keynote, as well as a concluding discussion and statement. Among the topics addressed are authentication, mobile ad-hoc network security, secure distributed document processing, access control, confidentiality, protocol attacks, delegation, certified transfer servers, intrusion tolerance, multi-party communication protocols, IPv6 security, and others | ||
650 | _aComputer security | ||
650 | _amulti-party communication protocols | ||
650 | _acertified transfer servers | ||
650 | _aintrusion toleranc | ||
650 | _aOperating systems | ||
650 | _aComputer software | ||
650 | _aInformation systems | ||
650 | _aComputer communication networks | ||
650 | _aData encryption | ||
650 | _aDistributed Document Processing | ||
650 | _aMobile Ad-Hoc Networks | ||
650 | _aMobile IPv6 Security | ||
650 | _aDolev-Yao Threat Model | ||
650 | _aComputers - Access control | ||
650 | _aCryptography | ||
942 |
_2ddc _cBK |