出版時(shí)間:2001-12 出版社:Springer 作者:Bruce Christianson 頁(yè)數(shù):255
內(nèi)容概要
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Security Protocols held in Cambridge, UK in April 2000.The 21 papers presented with transcriptions of the discussion following the presentation have gone through two rounds of revision and selection; also included are a keynote address and a discussion summary and an afterword by the volume editors. Among the topics addressed are authentication, trust in cyberspace, identification protocols, administration and government issues, specification, access privileges, PKI certificates, trust-based billing systems, public-key cryptosystems, denial of service, anonymous auction protocols, and certification
書(shū)籍目錄
Keynote Address: Security Protocols and the Swiss Army KnifeMergers and PrincipalsAuthentication and NamingUsers and Trust in CyberspaceInteractive Identification ProtocolsOpen QuestionsLooking on the Bright Side of Black-Box CryptographyGovernment Access to Keys - Panel DiscussionMaking Sense of Specifications: The Formalization of SETLack of Explicitness Strikes BackReview and Revocation of Access Privileges Distributed with PKI CertificatesThe Correctness of Crypto Transaction SetsMicro-management of Risk in a Trust-Based Billing SystemBroadening the Scope of Fault Tolerance within Secure ServicesDOS-Resistant Authentication with Client PuzzlesPublic-Key Crypto-systems Using Symmmetric-Key Crypto-algorithmsDenial of Service - Panel DiscussionThe Resurrecting Duckling - What Next?An Anonymous Auction Protocol Using "Money Escrow"Short Certification of Secure RSA ModulusAuthenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical AnalysisI Cannot Tell a LieAfterwardAuthor Index
圖書(shū)封面
評(píng)論、評(píng)分、閱讀與下載
安全協(xié)議Security protocols PDF格式下載
250萬(wàn)本中文圖書(shū)簡(jiǎn)介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書(shū)網(wǎng) 手機(jī)版