TEST - Catálogo BURRF
   

Security Protocols : 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 4631Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Descripción: recurso en líneaTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783540771562
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.A25
Recursos en línea:
Contenidos:
The System Likes You -- Experiences with Host-to-Host IPsec -- Experiences with Host-to-Host IPsec -- Repairing the Bluetooth Pairing Protocol -- Repairing the Bluetooth Pairing Protocol -- Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags -- Keep on Blockin’ in the Free World -- PIN (and Chip) or Signature: Beating the Cheating? -- PIN (and Chip) or Signature: Beating the Cheating? -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Multi-channel Protocols -- Multi-channel Protocols -- Combining Crypto with Biometrics: A New Human-Security Interface -- User-Friendly Grid Security Architecture and Protocols -- User-Friendly Grid Security Architecture and Protocols -- Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits with System Security CAPTCHAS -- The System Likes You? -- Enhancing Privacy with Shared Pseudo Random Sequences -- Enhancing Privacy with Shared Pseudo Random Sequences -- Non-repudiation and the Metaphysics of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols Are User-Unfriendly -- Understanding Why Some Network Protocols Are User-Unfriendly -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Listen Too Closely and You May Be Confused -- Listen Too Closely and You May Be Confused -- The Dining Freemasons (Security Protocols for Secret Societies) -- The Dining Freemasons (Security Protocols for Secret Societies) -- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) -- Safer Scripting Through Precompilation -- Safer Scripting Through Precompilation -- Implementing a Multi-hat PDA -- Implementing a Multi-hat PDA -- Anonymous Context Based Role Activation Mechanism -- Anonymous Context Based Role Activation Mechanism -- Topology of Covert Conflict -- The Initial Costs and Maintenance Costs of Protocols -- The Initial Costs and Maintenance Costs of Protocols -- Alice and Bob.
Resumen: This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

The System Likes You -- Experiences with Host-to-Host IPsec -- Experiences with Host-to-Host IPsec -- Repairing the Bluetooth Pairing Protocol -- Repairing the Bluetooth Pairing Protocol -- Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags -- Keep on Blockin’ in the Free World -- PIN (and Chip) or Signature: Beating the Cheating? -- PIN (and Chip) or Signature: Beating the Cheating? -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Authorisation Subterfuge by Delegation in Decentralised Networks -- Multi-channel Protocols -- Multi-channel Protocols -- Combining Crypto with Biometrics: A New Human-Security Interface -- User-Friendly Grid Security Architecture and Protocols -- User-Friendly Grid Security Architecture and Protocols -- Countering Automated Exploits with System Security CAPTCHAS -- Countering Automated Exploits with System Security CAPTCHAS -- The System Likes You? -- Enhancing Privacy with Shared Pseudo Random Sequences -- Enhancing Privacy with Shared Pseudo Random Sequences -- Non-repudiation and the Metaphysics of Presence -- Non-repudiation and the Metaphysics of Presence -- Understanding Why Some Network Protocols Are User-Unfriendly -- Understanding Why Some Network Protocols Are User-Unfriendly -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer -- Listen Too Closely and You May Be Confused -- Listen Too Closely and You May Be Confused -- The Dining Freemasons (Security Protocols for Secret Societies) -- The Dining Freemasons (Security Protocols for Secret Societies) -- On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) -- Safer Scripting Through Precompilation -- Safer Scripting Through Precompilation -- Implementing a Multi-hat PDA -- Implementing a Multi-hat PDA -- Anonymous Context Based Role Activation Mechanism -- Anonymous Context Based Role Activation Mechanism -- Topology of Covert Conflict -- The Initial Costs and Maintenance Costs of Protocols -- The Initial Costs and Maintenance Costs of Protocols -- Alice and Bob.

This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Security Protocols, held in Cambridge, UK, in April 2005. The 24 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha