Search alternatives:
internal security » internet security, international security, national security
internet securite » internet security

2
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... Networks -- The Resurrecting Duckling -- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks...

5
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... internet secure transactions based on collaborative domains -- How to build evidence in a public-key...

6
Published 1999
Springer Berlin Heidelberg
Table of Contents: ...Inductive Analysis of the Internet Protocol TLS -- Inductive Analysis of the Internet Protocol TLS...

8
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Keynote Address: Security Protocols and the Swiss Army Knife -- Mergers and Principals -- Mergers...

11
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks...

12
Published 2002
Springer Berlin Heidelberg
Table of Contents: ... Exchange for Internet Protocols -- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols...

13
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... Diffie-Hellman for Secure Key Exchange in MANETs -- Spraying Diffie-Hellman for Secure Key Exchange...

14
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from...

15
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... (Transcript of Discussion) -- One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA...

16
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back...

17
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike...

18
Published 2010
Springer Berlin Heidelberg
...Security and Cryptology...

19
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Introduction: Bringing Protocols to Life (Transcript of Discussion) -- Secure Internet Voting...

20
Published 2014
Springer International Publishing
Table of Contents: ... of the Pico password replacement system (Transcript of Discussion) -- I Bought a New Security Token and All I...