Check nearby libraries
Buy this book
Security Protocols: 6th International Workshop Cambridge, UK, April 15–17, 1998 Proceedings
Author: Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-65663-0
DOI: 10.1007/3-540-49135-X
Table of Contents:
- Inductive Analysis of the Internet Protocol TLS
- Inductive Analysis of the Internet Protocol TLS
- External Consistency and the Verification of Security Protocols
- External Consistency and the Verification of Security Protocols
- The Trust Shell Game
- The Trust Shell Game
- Overview of the AT&T Labs Trust-Management Project
- Overview of the AT&T Labs Trust-Management Project
- KeyNote: Trust Management for Public-Key Infrastructures
- Discussion Session — Trust Management
- Application-Oriented Security Policies and Their Composition
- Application-Oriented Security Policies and Their Composition
- Secure Fingerprinting Using Public-Key Cryptography
- Secure Fingerprinting Using Public-Key Cryptography
- Third Party Certification of HTTP Service Access Statistics
- Third Party Certification of HTTP Service Access Statistics
- Delegating Trust
- Delegation of Responsibilities
- Delegation of Responsibility
- Abuse of Process
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Computers, Congresses, Computer security, Cryptography, Access controlEdition | Availability |
---|---|
1
Security Protocols: 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings (Lecture Notes in Computer Science)
March 19, 1999, Springer
Paperback
in English
- 1 edition
3540656634 9783540656630
|
aaaa
Libraries near you:
WorldCat
|
Book Details
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?October 20, 2023 | Edited by ImportBot | import existing book |
February 14, 2019 | Created by MARC Bot | import existing book |