000 06103nam a22006855i 4500
001 978-3-540-31836-1
003 DE-He213
005 20240730195035.0
007 cr nn 008mamaa
008 100715s2005 gw | s |||| 0|eng d
020 _a9783540318361
_9978-3-540-31836-1
024 7 _a10.1007/11542322
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aSecurity Protocols
_h[electronic resource] :
_b11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers /
_cedited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
250 _a1st ed. 2005.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2005.
300 _aX, 354 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v3364
505 0 _aWhere Have All the Protocols Gone? -- A Protocol's Life After Attacks... -- A Protocol's Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- FromSecurity Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust.
520 _aGreetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aAlgorithms.
_93390
650 0 _aElectronic data processing
_xManagement.
_9158852
650 0 _aComputers and civilization.
_921733
650 0 _aOperating systems (Computers).
_95329
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9158853
650 2 4 _aAlgorithms.
_93390
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
650 2 4 _aOperating Systems.
_937074
700 1 _aChristianson, Bruce.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158854
700 1 _aCrispo, Bruno.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158855
700 1 _aMalcolm, James A.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158856
700 1 _aRoe, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9158857
710 2 _aSpringerLink (Online service)
_9158858
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540283898
776 0 8 _iPrinted edition:
_z9783540814542
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v3364
_9158859
856 4 0 _uhttps://doi.org/10.1007/11542322
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95438
_d95438