Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008406477/catalog> ?p ?o. }
Showing items 1 to 32 of
32
with 100 items per page.
- catalog abstract "Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.".
- catalog contributor b11710174.
- catalog contributor b11710175.
- catalog created "2000.".
- catalog date "2000".
- catalog date "2000.".
- catalog dateCopyrighted "2000.".
- catalog description "Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Keynote address : the changing environment / Roger Needham -- Composing security properties / Stewart Lee -- Auditing against multiple policies / Mark Lomas -- Jikzi : a new framework for secure publishing / Ross Anderson and Jong-Hyeon Lee -- Power and permission in security systems / Babak Sadighi Firozabadi and Marek Sergot -- Auditing against impossible abstractions / Bruce Christianson -- What is authentication? / Dieter Gollmann -- Relations between secrets : the Yahalom protocol / Lawrence C. Paulson -- Modelling agents' knowledge inductively / Giampaolo Bella -- Time-lock puzzle with examinable evidence of unlocking time / Wenbo Mao -- Trust management and network layer security protocols / Matt Blaze, John Ioannidis and Angelos D. Keromytis -- Issues in multicast security / Francesco Bergadano, Davide Cavagnino and Bruno Crispo -- Performance of protocols / Michael Roe -- Integrity-aware PCBC encryption schemes / Virgil D. Gligor and Pompiliu Donescu -- The resurrecting duckling : security issues for ad-hoc wireless networks / Frank Stajano and Ross Anderson -- INTERNET-MARKs : clear, secure, and portable visual marks for the cyber worlds / Hiroshi Yoshiura [and others] -- Pictures can't lie under oath / Bruce Christianson, James A. Malcolm and Brian Robinson -- Bob versus Bob -- good guy/bad guy / Bob Morris -- Transcript of concluding discussion -- Who knows? / Allan Ahlberg.".
- catalog extent "xii, 227 p. :".
- catalog identifier "3540673814 (softcover : alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 1796".
- catalog issued "2000".
- catalog issued "2000.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8 21".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computer software.".
- catalog subject "Computers Access control Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Information Systems.".
- catalog subject "QA76.9.A25 S44 2000".
- catalog tableOfContents "Keynote address : the changing environment / Roger Needham -- Composing security properties / Stewart Lee -- Auditing against multiple policies / Mark Lomas -- Jikzi : a new framework for secure publishing / Ross Anderson and Jong-Hyeon Lee -- Power and permission in security systems / Babak Sadighi Firozabadi and Marek Sergot -- Auditing against impossible abstractions / Bruce Christianson -- What is authentication? / Dieter Gollmann -- Relations between secrets : the Yahalom protocol / Lawrence C. Paulson -- Modelling agents' knowledge inductively / Giampaolo Bella -- Time-lock puzzle with examinable evidence of unlocking time / Wenbo Mao -- Trust management and network layer security protocols / Matt Blaze, John Ioannidis and Angelos D. Keromytis -- Issues in multicast security / Francesco Bergadano, Davide Cavagnino and Bruno Crispo -- Performance of protocols / Michael Roe -- Integrity-aware PCBC encryption schemes / Virgil D. Gligor and Pompiliu Donescu -- The resurrecting duckling : security issues for ad-hoc wireless networks / Frank Stajano and Ross Anderson -- INTERNET-MARKs : clear, secure, and portable visual marks for the cyber worlds / Hiroshi Yoshiura [and others] -- Pictures can't lie under oath / Bruce Christianson, James A. Malcolm and Brian Robinson -- Bob versus Bob -- good guy/bad guy / Bob Morris -- Transcript of concluding discussion -- Who knows? / Allan Ahlberg.".
- catalog title "Security protocols : 7th international workshop, Cambridge, UK, April 19-21, 1999 : proceedings / Bruce Christianson ... [et al.], (eds.).".
- catalog type "Cambridge (1999) swd".
- catalog type "Conference proceedings. fast".
- catalog type "text".