My Account Log in

1 option

Advances in Network and Distributed Systems Security : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen.

Ebook Central Academic Complete Available online

View online
Format:
Book
Conference/Event
Author/Creator:
IFIP TC11 WG11.4 Working Conference on Network Security, Corporate Author.
Contributor:
Decker, Bart de, 1958-
Conference Name:
IFIP TC11 WG11.4 Working Conference on Network Security (1st : 2001 : Louvain, Belgium)
IFIP TC11 WG11.4 Working Conference on Network Security
Series:
IFIP Advances in Information and Communication Technology, 1868-422X ; 78
Language:
English
Subjects (All):
Computer science.
Microprocessors.
Computer architecture.
Computer networks.
Electronic commerce.
Electronic data processing--Management.
Electronic data processing.
Theory of Computation.
Processor Architectures.
Computer Communication Networks.
e-Commerce and e-Business.
IT Operations.
Local Subjects:
Theory of Computation.
Processor Architectures.
Computer Communication Networks.
e-Commerce and e-Business.
IT Operations.
Physical Description:
1 online resource (218 p.)
Edition:
1st ed. 2002.
Place of Publication:
New York, NY : Springer US : Imprint: Springer, 2002.
Language Note:
English
Summary:
The more our society relies on electronic forms of communication, the more the security of these communication networks is essential for its well-functioning. As a consequence, research on methods and techniques to improve network security is extremely important. Topics in this volume include the developments in: security protocols; secure software engineering; mobile agent security; e-commerce security; and security for distributed computing.
Contents:
A Role-based Specification of the SET Payment Transaction Protocol
Information Security: Mutual Authentication in E-commerce
Software-based Receipt-freeness in On-line Elections
ID-based Structured Multisignature Schemes
Probabilistic Relations for the Solitaire Keystream Generator
Hazard Analysis for Security Protocol Requirements
Securing RMI Communication
Secure Java Development with UML
Security Through Aspect-oriented Programming
Extending a Campus Network with Remote Bubbles Using IPsec
Combining World Wide Web and Wireless Security
On Mobile Agent Based Transactions in Moderately Hostile Environments
Sparta
Shell’s Trust Domain Infrastructure Security Certification.
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
ISBN:
1-280-20490-7
9786610204908
0-306-46958-8
OCLC:
923695081

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account