Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

1
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... internet secure transactions based on collaborative domains -- How to build evidence in a public-key...

2
Published 1999
Springer Berlin Heidelberg
Table of Contents: ...Inductive Analysis of the Internet Protocol TLS -- Inductive Analysis of the Internet Protocol TLS...

3
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers...

4
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks...

5
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols...

6
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Diffie-Hellman for Secure Key Exchange in MANETs -- Spraying Diffie-Hellman for Secure Key Exchange...

7
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

8
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back...

9
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike...

10
Published 2014
Springer International Publishing
Table of Contents: ... of the Pico password replacement system (Transcript of Discussion) -- I Bought a New Security Token and All I...

11
Published 2020
Springer International Publishing
Table of Contents: ...Designing for humans -- Fresh perspectives -- Human limitations in security -- Secure sharing...

12
Published 2023
Springer Nature Switzerland
Table of Contents: ... Analysis of Smartwatches -- Trusted Introductions for Secure Messaging -- Choosing Your Friends: Shaping...

13
Published 2017
Springer International Publishing
Table of Contents: ...Multiple Objectives of Lawful-Surveillance Protocols -- Getting Security Objectives Wrong: A...

14
Published 2018
Springer International Publishing
Table of Contents: ... implementations (Transcript of Discussion) -- Non-Monotonic Security Protocols and Failures in Financial...

15
Published 2014
Springer Berlin Heidelberg
Table of Contents: ...Introduction: Virtually Perfect Security (Transcript of Discussion) -- Caught in the Maze...

16
Published 2011
Springer Berlin Heidelberg
...Security and Cryptology...

17
Published 2013
Springer Berlin Heidelberg
Subjects: ...Data and Information Security...

18
Published 2017
Springer International Publishing
Table of Contents: ...Evolving Security -- Considering that security protocols evolve -- Changing requirements...

19
Published 2015
Springer International Publishing
Subjects: ...Data and Information Security...