Security Protocols: 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers: Lecture Notes in Computer Science, cartea 2133
Editat de Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roeen Limba Engleză Paperback – 12 sep 2001
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (8) | 330.10 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 4 ian 2011 | 333.72 lei 3-5 săpt. | |
Springer Berlin, Heidelberg – 12 apr 2000 | 330.10 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 13 sep 2006 | 335.36 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 12 sep 2001 | 340.32 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 5 sep 2005 | 378.95 lei 38-44 zile | |
Springer Berlin, Heidelberg – 23 sep 2002 | 385.84 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 15 oct 2009 | 389.70 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 13 ian 2004 | 395.85 lei 6-8 săpt. |
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 381.21 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 15% Preț: 438.59 lei
- 20% Preț: 591.51 lei
- 20% Preț: 649.49 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 340.32 lei
Preț vechi: 425.40 lei
-20% Nou
Puncte Express: 510
Preț estimativ în valută:
65.13€ • 67.58$ • 54.44£
65.13€ • 67.58$ • 54.44£
Carte tipărită la comandă
Livrare economică 15-29 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540425663
ISBN-10: 3540425667
Pagini: 272
Ilustrații: VIII, 264 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.64 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540425667
Pagini: 272
Ilustrații: VIII, 264 p.
Dimensiuni: 155 x 235 x 14 mm
Greutate: 0.64 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Keynote Address: Security Protocols and the Swiss Army Knife.- Mergers and Principals.- Mergers and Principals.- Authentication and Naming.- Users and Trust in Cyberspace.- Users and Trust in Cyberspace.- Interactive Identification Protocols.- Open Questions.- Looking on the Bright Side of Black-Box Cryptography.- Government Access to Keys - Panel Discussion.- Making Sense of Specifications: The Formalization of SET.- Making Sense of Specifications: The Formalization of SET.- Lack of Explicitness Strikes Back.- Lack of Explicitness Strikes Back.- Review and Revocation of Access Privileges Distributed with PKI Certificates.- Review and Revocation of Access Privileges Distributed with PKI Certificates.- The Correctness of Crypto Transaction Sets.- The Correctness of Crypto Transaction Sets.- Micro-management of Risk in a Trust-Based Billing System.- Broadening the Scope of Fault Tolerance within Secure Services.- Broadening the Scope of Fault Tolerance within Secure Services.- DOS-Resistant Authentication with Client Puzzles.- DOS-Resistant Authentication with Client Puzzles.- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.- Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.- Denial of Service — Panel Discussion.- The Resurrecting Duckling — What Next?.- The Resurrecting Duckling — What Next?.- An Anonymous Auction Protocol Using “Money Escrow”.- Short Certification of Secure RSA Modulus.- Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis —.- Authentication Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis —.- I Cannot Tell a Lie.- Afterward.
Caracteristici
Includes supplementary material: sn.pub/extras
Textul de pe ultima copertă
This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.
The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.