安全协议Security protocols

分類: 图书,计算机/网络,信息安全,
作者: Bruce Christianson著
出 版 社: 湖南文艺出版社
出版时间: 2001-12-1字数:版次: 1页数: 255印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540425663包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research,development,and education,at a high level and in both printed and electronic form.Enjoying tight cooperation with the R&D community,with numerous individuals,as well as with prestigious organizations and societies,LNCS has grown into the most comprehensive computer science research forum available.
The scope of LNCS including its subseries LNAI spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields.The type of material published traditionally includes.
—proceedings (published in time for the respective conference)
—post-proceedings (consisting of thoroughly revised final full papers)
—research monographs(which may be based on outstanding PhD work,research projects,technical reports,etc.)
内容简介
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Security Protocols held in Cambridge, UK in April 2000.The 21 papers presented with transcriptions of the discussion following the presentation have gone through two rounds of revision and selection; also included are a keynote address and a discussion summary and an afterword by the volume editors. Among the topics addressed are authentication, trust in cyberspace, identification protocols, administration and government issues, specification, access privileges, PKI certificates, trust-based billing systems, public-key cryptosystems, denial of service, anonymous auction protocols, and certification
目录
Keynote Address: Security Protocols and the Swiss Army Knife
Mergers and Principals
Authentication and Naming
Users and Trust in Cyberspace
Interactive Identification Protocols
Open Questions
Looking on the Bright Side of Black-Box Cryptography
Government Access to Keys - Panel Discussion
Making Sense of Specifications: The Formalization of SET
Lack of Explicitness Strikes Back
Review and Revocation of Access Privileges Distributed with PKI Certificates
The Correctness of Crypto Transaction Sets
Micro-management of Risk in a Trust-Based Billing System
Broadening the Scope of Fault Tolerance within Secure Services
DOS-Resistant Authentication with Client Puzzles
Public-Key Crypto-systems Using Symmmetric-Key Crypto-algorithms
Denial of Service - Panel Discussion
The Resurrecting Duckling - What Next?
An Anonymous Auction Protocol Using "Money Escrow"
Short Certification of Secure RSA Modulus
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis
I Cannot Tell a Lie
Afterward
Author Index