Security Protocols XX

Security Protocols XX

4.11 - 1251 ratings - Source

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was qBringing protocols to lifeq.Authentication protocols attempt to discern whether or not a user is who she says she is based on what she has, is or knows. ... When controlling access to a Wiki, we do not need to know the name or government-issued ID number of a contributor, we would simply ... This approach is not applicable to other networked services such as mail servers, anonymous FTP servers or distributed hash tables sinceanbsp;...

Title:Security Protocols XX
Author:Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson
Publisher:Springer - 2012-11-28


You Must CONTINUE and create a free account to access unlimited downloads & streaming