Book Details

978-3-540-40926-7

Security Protocols (vol. # 3957)

Publication year: 2006

ISBN: 978-3-540-40926-7

Internet Resource: Please Login to download book


" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme this workshop was “Authentic Privacy.” Traditionally we have based authentication upon a rather strong notion of identity, and have then built other security services on top of authentication. Perhaps if we want a more nuanced notion of privacy, then we need to re-examine some of our assu- tions, particularly when attackers and defenders share the same resources and infrastructure.


Subject: Computer Science, Bridge, Denial of Service, access control, ad-hoc network security, anonymity, authentication, block, stream ciphers, cryptographic protocols, delegation, information security, mobile security, network security, protocol attacks, security, verification