UPT Perpustakaan UNS

  • Beranda
  • Informasi
  • Berita
  • Bantuan
  • Pustakawan
  • Area Anggota
  • Pilih Bahasa :
    Bahasa Arab Bahasa Bengal Bahasa Brazil Portugis Bahasa Inggris Bahasa Spanyol Bahasa Jerman Bahasa Indonesia Bahasa Jepang Bahasa Melayu Bahasa Persia Bahasa Rusia Bahasa Thailand Bahasa Turki Bahasa Urdu

Pencarian berdasarkan :

SEMUA Pengarang Subjek ISBN/ISSN Pencarian Spesifik

Pencarian terakhir:

{{tmpObj[k].text}}
No image available for this title
Penanda Bagikan

E Book

Security Protocols

Christianson, Bruce. - Nama Orang; Crispo, Bruno. - Nama Orang; Malcolm, James A. - Nama Orang; Roe, Michael. - Nama Orang;

Where Have All the Protocols Gone? -- A Protocol’s Life After Attacks... -- A Protocol’s Life After Attacks... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust.Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.


Ketersediaan
#
Koleksi E Book Belum memasukkan lokasi
9783540318361
Tersedia
Informasi Detail
Judul Seri
-
No. Panggil
-
Penerbit
Berlin, Heidelberg : Springer., 2005
Deskripsi Fisik
X, 354 p.online resource.
Bahasa
English
ISBN/ISSN
9783540318361
Klasifikasi
005.82
Tipe Isi
-
Tipe Media
-
Tipe Pembawa
-
Edisi
1st ed.
Subjek
Management information systems.
Computer communication systems.
Computer Communication Networks.
Computers and civilization.
Computers and Society.
Data encryption (Computer science).
Algorithms.
Cryptology.
Algorithm Analysis and Problem Complexity.
Computer science.
Management of Computing and Information Systems.
Operating systems (Computers).
Operating Systems.
Info Detail Spesifik
-
Pernyataan Tanggungjawab
Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Versi lain/terkait

Tidak tersedia versi lain

Lampiran Berkas
Tidak Ada Data
Komentar

Anda harus masuk sebelum memberikan komentar

UPT Perpustakaan UNS
  • Informasi
  • Layanan
  • Pustakawan
  • Area Anggota

Tentang Kami

UNSLA (UNS Library Automation) adalah sistem manajemen perpustakaan daring yang dikembangkan untuk mendukung layanan informasi, penelusuran koleksi, dan pengelolaan sumber daya pustaka di lingkungan Universitas Sebelas Maret. Menggunakan platform Senayan Library Management System (SLiMS), aplikasi ini memberikan kemudahan bagi pemustaka dan pustakawan dalam mengakses, mengelola, dan memanfaatkan koleksi perpustakaan secara cepat, akurat, dan terintegrasi.

Cari

masukkan satu atau lebih kata kunci dari judul, pengarang, atau subjek

Donasi untuk SLiMS Kontribusi untuk SLiMS?

© 2025 — Senayan Developer Community

Ditenagai oleh SLiMS
Pilih subjek yang menarik bagi Anda
  • Karya Umum
  • Filsafat
  • Agama
  • Ilmu-ilmu Sosial
  • Bahasa
  • Ilmu-ilmu Murni
  • Ilmu-ilmu Terapan
  • Kesenian, Hiburan, dan Olahraga
  • Kesusastraan
  • Geografi dan Sejarah
Icons made by Freepik from www.flaticon.com
Pencarian Spesifik
Kemana ingin Anda bagikan?