Springer Book Archives
Keynote Address: Mobile Computing versus Immobile Security.- Experiences of Mobile IP Security.- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.- Denial of sService, Address Ownership, and Early Authentication in the IPv6 World.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.- Thwarting Timing Attacks Using ATM Networks.- Thwarting Timing Attacks Using ATM Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- Towards a Survivable Security Architecture for Ad-Hoc Networks.- PIM Security.- PIM Security.- Merkle Puzzles Revisited — Finding Matching Elements between Lists.- Merkle Puzzles Revisited.- Encapsulating Rules of Prudent Security Engineering.- Encapsulating Rules of Prudent Security Engineering.- A Multi-OS Approach to Trusted Computer Systems.- A Multi-OS Approach to Trusted Computer Systems.- A Proof of Non-repudiation.- A Proof of Non-repudiation.- Using Authority Certificates to Create Management Structures.- Using Attribute Certificates for Creating Management Structures.- Trust Management and Whether to Delegate.- Trust Management and Whether to Delegate.- You Can’t Take It with You.- Protocols Using Keys from Faulty Data.- Protocols Using Keys from Faulty Data.- On the Negotiation of Access Control Policies.- Negotiation of Access Control Policies.- Intrusion-Tolerant Group Management in Enclaves.- Lightweight Authentication in a Mobile Network.- Bluetooth Security — Fact or Fiction?.- Concluding Discussion When Does Confidentiality Harm Security?.- The Last Word.
![]() |
Ask a Question About this Product More... |
![]() |