CHF 69.00

Security Protocols
11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers

Inglese · Tascabile

Spedizione di solito entro 4 a 7 giorni lavorativi

Descrizione

Ulteriori informazioni

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.

Dettagli sul prodotto

Con la collaborazione di Bruce Christianson (Editore), Bruno Crispo (Editore), James A. Malcolm (Editore), Michael Roe (Editore)
Editore Springer, Berlin
 
Contenuto Libro
Forma del prodotto Tascabile
Data pubblicazione 05.09.2005
Categoria Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica
 
EAN 9783540283898
ISBN 978-3-540-28389-8
Numero di pagine 354
Illustrazioni X, 354 p.
Dimensioni (della confezione) 15.5 x 23.5 cm
 
Serie Lecture Notes in Computer Science > 3364
Security and Cryptology > 3364
Categorie Bridge, C, Algorithmen und Datenstrukturen, Algorithms, Wirtschaftsmathematik und -informatik, IT-Management, Delegation, Security, Betriebssysteme, Netzwerk-Hardware, Kryptografie, Verschlüsselungstechnologie, EDV / Theorie / Sicherheit, computer science, Verification, authentication, Computers and Society, Management of Computing and Information Systems, IT Operations, Computer Communication Networks, Operating systems, Algorithms & data structures, Maintenance & repairs, information architecture, Ethical & social aspects of IT, Computers and civilization, Management information systems, Algorithm Analysis and Problem Complexity, Data encryption, Data encryption (Computer science), Cryptology, Computer communication systems, Operating systems (Computers), Network hardware, Anonymity, Digital- und Informationstechnologien: soziale und ethische Aspekte, InformationSecurity, algorithmanalysisandproblemcomplexity, NetworkSecurity, accesscontrol, InternetSecurity, CryptographicProtocols, mobilesecurity, denialofservice, ad-hocnetworksecurity, securegroupcommunicati
 

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.