
Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings Author: Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe Published by Springer Berlin Heidelberg ISBN: 978-3-540-67381-1 DOI: 10.1007/10720107 Table of Contents: Keynote Address: The Changing Environment Composing Security Properties Auditing against Multiple Policies Jikzi: A New Framework for Secure Publishing Jikzi: A New Framework for Secure Publishing Power and Permission in Security Systems Power and Permission in Computer Systems Auditing against Impossible Abstractions What is Authentication? Relations Between Secrets: The Yahalom Protocol The Yahalom Protocol Modelling Agents’ Knowledge Inductively Modelling Agents’ Knowledge Inductively Time-Lock Puzzle with Examinable Evidence of Unlocking Time Time-Lock Puzzle with Examinable Evidence of Unlocking Time Trust Management and Network Layer Security Protocols Trust Management and Network Layer Security Protocols Issues in Multicast Security Issues in Multicast Security Performance of Protocols
Page Count:
229
Publication Date:
2000-01-01
No comments yet. Be the first to share your thoughts!