Security Protocols 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.

Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was “mobile computing versus immobile security”. As usual, the insights and challenges which emerged during the workshop are re?ected i...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Christianson, Bruce (Editor), Crispo, Bruno (Editor), Malcolm, James A. (Editor), Roe, Michael (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Edition:1st ed. 2002.
Series:Lecture Notes in Computer Science, 2467
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Keynote Address: Mobile Computing versus Immobile Security
  • Experiences of Mobile IP Security
  • Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World
  • Denial of sService, Address Ownership, and Early Authentication in the IPv6 World
  • Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
  • Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
  • Thwarting Timing Attacks Using ATM Networks
  • Thwarting Timing Attacks Using ATM Networks
  • Towards a Survivable Security Architecture for Ad-Hoc Networks
  • Towards a Survivable Security Architecture for Ad-Hoc Networks
  • PIM Security
  • PIM Security
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists
  • Merkle Puzzles Revisited
  • Encapsulating Rules of Prudent Security Engineering
  • Encapsulating Rules of Prudent Security Engineering
  • A Multi-OS Approach to Trusted Computer Systems
  • A Multi-OS Approach to Trusted Computer Systems
  • A Proof of Non-repudiation
  • A Proof of Non-repudiation
  • Using Authority Certificates to Create Management Structures
  • Using Attribute Certificates for Creating Management Structures
  • Trust Management and Whether to Delegate
  • Trust Management and Whether to Delegate
  • You Can’t Take It with You
  • Protocols Using Keys from Faulty Data
  • Protocols Using Keys from Faulty Data
  • On the Negotiation of Access Control Policies
  • Negotiation of Access Control Policies
  • Intrusion-Tolerant Group Management in Enclaves
  • Lightweight Authentication in a Mobile Network
  • Bluetooth Security — Fact or Fiction?
  • Concluding Discussion When Does Confidentiality Harm Security?
  • The Last Word.