Security Protocols : 11th International Workshop, Cambridge, Uk, April 2-4, 2003, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Security Protocols : 11th International Workshop, Cambridge, Uk, April 2-4, 2003, Revised Selected Papers (Lecture Notes in Computer Science)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 349 p.
  • 言語 ENG
  • 商品コード 9783540283898
  • DDC分類 005.8

Full Description

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.

Contents

Where Have All the Protocols Gone?.- A Protocol's Life After Attacks....- A Protocol's Life After Attacks....- Towards Flexible Credential Negotiation Protocols.- Towards Flexible Credential Negotiation Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Man-in-the-Middle in Tunnelled Authentication Protocols.- Towards a Framework for Autonomic Security Protocols.- Towards a Framework for Autonomic Security Protocols.- Client v. Server Side Protocols, Interfaces and Storage.- Client v. Server Side Protocols, Interfaces and Storage.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks.- Protocol Codesign.- Protocol Codesign.- Enforcing Security Policies for Distributed Objects Applications.- Enforcing Security Policies for Distributed Objects Applications.- Regular SPKI.- Regular SPKI.- Federated Identity-Management Protocols.- Federated Identity-Management Protocols.- Enforcing the Unenforceable.- Is the Verification Problem for Cryptographic Protocols Solved?.- Secure Sessions from Weak Secrets.- Secure Sessions from Weak Secrets.- Panel Session: Is Protocol Modelling Finished?.- WAR: Wireless Anonymous Routing.- WAR: Wireless Anonymous Routing.- Limitations of IPsec Policy Mechanisms.- Limitations of IPsec Policy Mechanisms.- Deniable Authenticated Key Establishment for Internet Protocols.- Deniable Authenticated Key Establishment for Internet Protocols.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.- What We Can Learn from API Security.- Addressing New Challenges by Building Security Protocols Around Graphs.- From Security Protocols to Systems Security.- FromSecurity Protocols to Systems Security.- Biometrics to Enhance Smartcard Security.- Biometrics to Enhance Smartcard Security.- Blind Publication: A Copyright Library without Publication or Trust.- Blind Publication: A Copyright Library Without Publication or Trust.

最近チェックした商品