Roger Needham (auth.), Bruce Christianson, James A. Malcolm, Bruno Crispo, Michael Roe (eds.)3540442634, 9783540442639
Table of contents :
Keynote Address: Mobile Computing versus Immobile Security….Pages 1-3
Experiences of Mobile IP Security….Pages 4-11
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World….Pages 12-21
Denial of sService, Address Ownership, and Early Authentication in the IPv6 World….Pages 22-26
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols….Pages 27-39
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols….Pages 40-48
Thwarting Timing Attacks Using ATM Networks….Pages 49-58
Thwarting Timing Attacks Using ATM Networks….Pages 59-62
Towards a Survivable Security Architecture for Ad-Hoc Networks….Pages 63-73
Towards a Survivable Security Architecture for Ad-Hoc Networks….Pages 74-79
PIM Security….Pages 80-81
PIM Security….Pages 82-86
Merkle Puzzles Revisited — Finding Matching Elements between Lists….Pages 87-90
Merkle Puzzles Revisited….Pages 91-94
Encapsulating Rules of Prudent Security Engineering….Pages 95-101
Encapsulating Rules of Prudent Security Engineering….Pages 102-106
A Multi-OS Approach to Trusted Computer Systems….Pages 107-114
A Multi-OS Approach to Trusted Computer Systems….Pages 115-118
A Proof of Non-repudiation….Pages 119-125
A Proof of Non-repudiation….Pages 126-133
Using Authority Certificates to Create Management Structures….Pages 134-145
Using Attribute Certificates for Creating Management Structures….Pages 146-150
Trust Management and Whether to Delegate….Pages 151-157
Trust Management and Whether to Delegate….Pages 158-165
You Can’t Take It with You….Pages 166-169
Protocols Using Keys from Faulty Data….Pages 170-179
Protocols Using Keys from Faulty Data….Pages 180-187
On the Negotiation of Access Control Policies….Pages 188-201
Negotiation of Access Control Policies….Pages 202-212
Intrusion-Tolerant Group Management in Enclaves….Pages 213-216
Lightweight Authentication in a Mobile Network….Pages 217-220
Bluetooth Security — Fact or Fiction?….Pages 221-228
Concluding Discussion When Does Confidentiality Harm Security?….Pages 229-238
The Last Word….Pages 239-239
Reviews
There are no reviews yet.