Security Protocols: 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers / Edition 1

Security Protocols: 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers / Edition 1

ISBN-10:
3540425667
ISBN-13:
9783540425663
Pub. Date:
10/25/2001
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3540425667
ISBN-13:
9783540425663
Pub. Date:
10/25/2001
Publisher:
Springer Berlin Heidelberg
Security Protocols: 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers / Edition 1

Security Protocols: 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers / Edition 1

Paperback

$54.99 Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The Cambridge International Workshop on Security Prools has now run for eight years. Each year we set a theme, focusing upon a specific aspect of security prools, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don’t insist they relate to the current theme in an obvious way. In our experience, the emergence of the theme as a unifying thread takes place during the discussions at the workshop itself. The only ground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a finished piece of work. When the participants meet, we try to focus the discussions upon the conc- tual issues which emerge. Security prools link naturally to many other areas of Computer Science, and deep water can be reached very quickly. Afterwards, we invite participants to re-draft their position papers in a way which exposes the emergent issues but leaves open the way to their further development. We also prepare written transcripts of the recorded discussions. These are edited (in some cases very heavily) to illustrate the way in which the different arguments and perspectives have interacted. We publish these proceedings as an invitation to the research community. Although many interesting results first see the light of day in a volume of our proceedings, laying claim to these is not our primary purpose of publication. Rather, we bring our discussions and insights to a wider audience in order to suggest new lines of investigation which the community may fruitfully pursue.

Product Details

ISBN-13: 9783540425663
Publisher: Springer Berlin Heidelberg
Publication date: 10/25/2001
Series: Lecture Notes in Computer Science , #2133
Edition description: 2001
Pages: 264
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Keynote Address: Security Prools and the Swiss Army Knife.- Mergers and Principals.- Mergers and Principals.- Authentication and Naming.- Users and Trust in Cyberspace.- Users and Trust in Cyberspace.- Interactive Identification Prools.- Open Questions.- Looking on the Bright Side of Black-Box Cryptography.- Government Access to Keys - Panel Discussion.- Making Sense of Specifications: The Formalization of SET.- Making Sense of Specifications: The Formalization of SET.- Lack of Explicitness Strikes Back.- Lack of Explicitness Strikes Back.- Review and Revocation of Access Privileges Distributed with PKI Certificates.- Review and Revocation of Access Privileges Distributed with PKI Certificates.- The Correctness of Crypto Transaction Sets.- The Correctness of Crypto Transaction Sets.- Micro-management of Risk in a Trust-Based Billing System.- Broadening the Scope of Fault Tolerance within Secure Services.- Broadening the Scope of Fault Tolerance within Secure Services.- DOS-Resistant Authentication with Client Puzzles.- DOS-Resistant Authentication with Client Puzzles.- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.- Denial of Service — Panel Discussion.- The Resurrecting Duckling — What Next?.- The Resurrecting Duckling — What Next?.- An Anonymous Auction Prool Using “Money Escrow”.- Short Certification of Secure RSA Modulus.- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis —.- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis —.- I Cannot Tell a Lie.- Afterward.
From the B&N Reads Blog

Customer Reviews