1 option
Advances in Network and Distributed Systems Security : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen.
- Format:
- Book
- Conference/Event
- Author/Creator:
- IFIP TC11 WG11.4 Working Conference on Network Security, Corporate Author.
- Conference Name:
- IFIP TC11 WG11.4 Working Conference on Network Security (1st : 2001 : Louvain, Belgium)
- IFIP TC11 WG11.4 Working Conference on Network Security
- Series:
- IFIP Advances in Information and Communication Technology, 1868-422X ; 78
- Language:
- English
- Subjects (All):
- Computer science.
- Microprocessors.
- Computer architecture.
- Computer networks.
- Electronic commerce.
- Electronic data processing--Management.
- Electronic data processing.
- Theory of Computation.
- Processor Architectures.
- Computer Communication Networks.
- e-Commerce and e-Business.
- IT Operations.
- Local Subjects:
- Theory of Computation.
- Processor Architectures.
- Computer Communication Networks.
- e-Commerce and e-Business.
- IT Operations.
- Physical Description:
- 1 online resource (218 p.)
- Edition:
- 1st ed. 2002.
- Place of Publication:
- New York, NY : Springer US : Imprint: Springer, 2002.
- Language Note:
- English
- Summary:
- The more our society relies on electronic forms of communication, the more the security of these communication networks is essential for its well-functioning. As a consequence, research on methods and techniques to improve network security is extremely important. Topics in this volume include the developments in: security protocols; secure software engineering; mobile agent security; e-commerce security; and security for distributed computing.
- Contents:
- A Role-based Specification of the SET Payment Transaction Protocol
- Information Security: Mutual Authentication in E-commerce
- Software-based Receipt-freeness in On-line Elections
- ID-based Structured Multisignature Schemes
- Probabilistic Relations for the Solitaire Keystream Generator
- Hazard Analysis for Security Protocol Requirements
- Securing RMI Communication
- Secure Java Development with UML
- Security Through Aspect-oriented Programming
- Extending a Campus Network with Remote Bubbles Using IPsec
- Combining World Wide Web and Wireless Security
- On Mobile Agent Based Transactions in Moderately Hostile Environments
- Sparta
- Shell’s Trust Domain Infrastructure Security Certification.
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- ISBN:
- 1-280-20490-7
- 9786610204908
- 0-306-46958-8
- OCLC:
- 923695081
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.