Buch, Englisch, Band 78, 208 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 341 g
Reihe: IFIP Advances in Information and Communication Technology
IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium
Buch, Englisch, Band 78, 208 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 341 g
Reihe: IFIP Advances in Information and Communication Technology
ISBN: 978-1-4757-7665-2
Verlag: Springer US
practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsmathematik und -statistik
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Informatik Rechnerarchitektur
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Geistes- und Sozialwissenschaften
- Mathematik | Informatik EDV | Informatik Informatik Mathematik für Informatiker
Weitere Infos & Material
A Role-based Specification of the SET Payment Transaction Protocol.- Information Security: Mutual Authentication in E-commerce.- Software-based Receipt-freeness in On-line Elections.- ID-based Structured Multisignature Schemes.- Probabilistic Relations for the Solitaire Keystream Generator.- Hazard Analysis for Security Protocol Requirements.- Securing RMI Communication.- Secure Java Development with UML.- Security Through Aspect-oriented Programming.- Extending a Campus Network with Remote Bubbles Using IPsec.- Combining World Wide Web and Wireless Security.- On Mobile Agent Based Transactions in Moderately Hostile Environments.- Sparta.- Shell’s Trust Domain Infrastructure Security Certification.