Security protocols

Security protocols
About this book
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings<br />Author: Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-67381-1<br /> DOI: 10.1007/10720107<br /><br />Table of Contents:<p></p><ul><li>Keynote Address: The Changing Environment
</li><li>Composing Security Properties
</li><li>Auditing against Multiple Policies
</li><li>Jikzi: A New Framework for Secure Publishing
</li><li>Jikzi: A New Framework for Secure Publishing
</li><li>Power and Permission in Security Systems
</li><li>Power and Permission in Computer Systems
</li><li>Auditing against Impossible Abstractions
</li><li>What is Authentication?
</li><li>Relations Between Secrets: The Yahalom Protocol
</li><li>The Yahalom Protocol
</li><li>Modelling Agents’ Knowledge Inductively
</li><li>Modelling Agents’ Knowledge Inductively
</li><li>Time-Lock Puzzle with Examinable Evidence of Unlocking Time
</li><li>Time-Lock Puzzle with Examinable Evidence of Unlocking Time
</li><li>Trust Management and Network Layer Security Protocols
</li><li>Trust Management and Network Layer Security Protocols
</li><li>Issues in Multicast Security
</li><li>Issues in Multicast Security
</li><li>Performance of Protocols</li></ul>
Details
- OL Work ID
- OL16997618W
Subjects
ComputersCongressesComputer securityCryptographyAccess control