Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540283897, 9783540283898
Table of contents :
Front Matter….Pages –
Where Have All the Protocols Gone?….Pages 1-2
A Protocol’s Life After Attacks…….Pages 3-10
A Protocol’s Life After Attacks…….Pages 11-18
Towards Flexible Credential Negotiation Protocols….Pages 19-23
Towards Flexible Credential Negotiation Protocols….Pages 24-27
Man-in-the-Middle in Tunnelled Authentication Protocols….Pages 28-41
Man-in-the-Middle in Tunnelled Authentication Protocols….Pages 42-48
Towards a Framework for Autonomic Security Protocols….Pages 49-54
Towards a Framework for Autonomic Security Protocols….Pages 55-62
Client v. Server Side Protocols, Interfaces and Storage….Pages 63-73
Client v. Server Side Protocols, Interfaces and Storage….Pages 74-79
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks….Pages 80-96
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks….Pages 97-105
Protocol Codesign….Pages 106-113
Protocol Codesign….Pages 114-118
Enforcing Security Policies for Distributed Objects Applications….Pages 119-130
Enforcing Security Policies for Distributed Objects Applications….Pages 131-133
Regular SPKI….Pages 134-150
Regular SPKI….Pages 151-152
Federated Identity-Management Protocols….Pages 153-174
Federated Identity-Management Protocols….Pages 175-177
Enforcing the Unenforceable….Pages 178-182
Is the Verification Problem for Cryptographic Protocols Solved?….Pages 183-189
Secure Sessions from Weak Secrets….Pages 190-205
Secure Sessions from Weak Secrets….Pages 206-212
Panel Session: Is Protocol Modelling Finished?….Pages 213-217
WAR: Wireless Anonymous Routing….Pages 218-232
WAR: Wireless Anonymous Routing….Pages 233-240
Limitations of IPsec Policy Mechanisms….Pages 241-251
Limitations of IPsec Policy Mechanisms….Pages 252-254
Deniable Authenticated Key Establishment for Internet Protocols….Pages 255-271
Deniable Authenticated Key Establishment for Internet Protocols….Pages 272-273
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks….Pages 274-282
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks….Pages 283-287
What We Can Learn from API Security….Pages 288-300
Addressing New Challenges by Building Security Protocols Around Graphs….Pages 301-306
From Security Protocols to Systems Security….Pages 307-322
From Security Protocols to Systems Security….Pages 323-323
Biometrics to Enhance Smartcard Security….Pages 324-332
Biometrics to Enhance Smartcard Security….Pages 333-335
Blind Publication: A Copyright Library without Publication or Trust….Pages 336-340
Blind Publication: A Copyright Library Without Publication or Trust….Pages 341-349
Back Matter….Pages –
Reviews
There are no reviews yet.