Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Security protocolsSecurity protocols

Security protocols

Bruce Christianson

About this book

Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings<br />Author: Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-67381-1<br /> DOI: 10.1007/10720107<br /><br />Table of Contents:<p></p><ul><li>Keynote Address: The Changing Environment </li><li>Composing Security Properties </li><li>Auditing against Multiple Policies </li><li>Jikzi: A New Framework for Secure Publishing </li><li>Jikzi: A New Framework for Secure Publishing </li><li>Power and Permission in Security Systems </li><li>Power and Permission in Computer Systems </li><li>Auditing against Impossible Abstractions </li><li>What is Authentication? </li><li>Relations Between Secrets: The Yahalom Protocol </li><li>The Yahalom Protocol </li><li>Modelling Agents’ Knowledge Inductively </li><li>Modelling Agents’ Knowledge Inductively </li><li>Time-Lock Puzzle with Examinable Evidence of Unlocking Time </li><li>Time-Lock Puzzle with Examinable Evidence of Unlocking Time </li><li>Trust Management and Network Layer Security Protocols </li><li>Trust Management and Network Layer Security Protocols </li><li>Issues in Multicast Security </li><li>Issues in Multicast Security </li><li>Performance of Protocols</li></ul>

Details

OL Work ID
OL16997618W

Subjects

ComputersCongressesComputer securityCryptographyAccess control

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.