ORPP logo
Image from Google Jackets

Advances in Network and Distributed Systems Security : IFIP TC11 WG11. 4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium.

By: Contributor(s): Material type: TextTextSeries: IFIP Advances in Information and Communication Technology SeriesPublisher: New York, NY : Springer, 2001Copyright date: ©2002Edition: 1st edDescription: 1 online resource (218 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780306469589
Subject(s): Genre/Form: Additional physical formats: Print version:: Advances in Network and Distributed Systems SecurityLOC classification:
  • QA75.5-76.95
Online resources:
Contents:
Intro -- CONTENTS -- PREFACE -- ACKNOWLEDGEMENTS -- PART ONE Reviewed Papers -- A ROLE- BASED SPECIFICATION OF THE SET PAYMENT TRANSACTION PROTOCOL -- INFORMATION SECURITY: MUTUAL AUTHENTICATION IN E- COMMERCE -- SOFTWARE- BASED RECEIPT- FREENESS IN ON- LINE ELECTIONS -- ID-BASED STRUCTURED MULTISIGNATURE SCHEMES -- PROBABILISTIC RELATIONS FOR THE SOLITAIRE KEYSTREAM GENERATOR -- HAZARD ANALYSIS FOR SECURITY PROTOCOL REQUIREMENTS -- SECURING RMI COMMUNICATION -- SECURE JAVA DEVELOPMENT WITH UML -- SECURITY THROUGH ASPECT- ORIENTED PROGRAMMING -- EXTENDING A CAMPUS NETWORK WITH REMOTE BUBBLES USING IPSEC -- COMBINING WORLD WIDE WEB AND WIRELESS SECURITY -- ON MOBILE AGENT BASED TRANSACTIONS IN MODERATELY HOSTILE ENVIRONMENTS * -- PART TWO Invited Papers -- SHELL'S TRUST DOMAIN INFRASTRUCTURE SECURITY CERTIFICATION Linking security management to business objectives -- AUTHOR INDEX.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- CONTENTS -- PREFACE -- ACKNOWLEDGEMENTS -- PART ONE Reviewed Papers -- A ROLE- BASED SPECIFICATION OF THE SET PAYMENT TRANSACTION PROTOCOL -- INFORMATION SECURITY: MUTUAL AUTHENTICATION IN E- COMMERCE -- SOFTWARE- BASED RECEIPT- FREENESS IN ON- LINE ELECTIONS -- ID-BASED STRUCTURED MULTISIGNATURE SCHEMES -- PROBABILISTIC RELATIONS FOR THE SOLITAIRE KEYSTREAM GENERATOR -- HAZARD ANALYSIS FOR SECURITY PROTOCOL REQUIREMENTS -- SECURING RMI COMMUNICATION -- SECURE JAVA DEVELOPMENT WITH UML -- SECURITY THROUGH ASPECT- ORIENTED PROGRAMMING -- EXTENDING A CAMPUS NETWORK WITH REMOTE BUBBLES USING IPSEC -- COMBINING WORLD WIDE WEB AND WIRELESS SECURITY -- ON MOBILE AGENT BASED TRANSACTIONS IN MODERATELY HOSTILE ENVIRONMENTS * -- PART TWO Invited Papers -- SHELL'S TRUST DOMAIN INFRASTRUCTURE SECURITY CERTIFICATION Linking security management to business objectives -- AUTHOR INDEX.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.