Book Details

Security Protocols (vol. # 3364)

Publication year: 2005

ISBN: 978-3-540-31836-1

Internet Resource: Please Login to download book


Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems.


Subject: Computer Science, Bridge, Denial of Service, access control, ad-hoc network security, anonymity, authentication, cryptographic protocols, delegation, information security, internet security, mobile security, network security, secure group communicati, security, verification