Security Protocols
by Christianson, Bruce; Crispo, Bruno; Malcom, James A.; Roe, MichaelRent Textbook
Rent Digital
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| The System Likes You (Transcript of Discussion) | p. 1 |
| Experiences with Host-to-Host IPsec | p. 3 |
| Discussion | p. 23 |
| Repairing the Bluetooth Pairing Protocol | p. 31 |
| Discussion | p. 46 |
| Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags | p. 51 |
| Discussion | p. 60 |
| PIN (and Chip) or Signature: Beating the Cheating? | p. 69 |
| Discussion | p. 76 |
| Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) | p. 82 |
| Discussion | p. 89 |
| Authorisation Subterfuge by Delegation in Decentralised Networks | p. 97 |
| Discussion | p. 103 |
| Multi-channel Protocols | p. 112 |
| Discussion | p. 128 |
| Combining Crypto with Biometrics: A New Human-Security Interface (Transcript of Discussion) | p. 133 |
| User-Friendly Grid Security Architecture and Protocols | p. 139 |
| Discussion | p. 157 |
| Countering Automated Exploits with System Security CAPTCHAS | p. 162 |
| Discussion | p. 170 |
| The System Likes You? (Transcript of Discussion) | p. 180 |
| Enhancing Privacy with Shared Pseudo Random Sequences | p. 187 |
| Discussion | p. 197 |
| Non-repudiation and the Metaphysics of Presence (Extended Abstract) | p. 204 |
| Discussion | p. 207 |
| Understanding Why Some Network Protocols Are User-Unfriendly | p. 215 |
| Discussion | p. 220 |
| Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer | p. 228 |
| Discussion | p. 238 |
| Listen Too Closely and You May Be Confused | p. 245 |
| Discussion | p. 250 |
| The Dining Freemasons (Security Protocols for Secret Societies) | p. 258 |
| Discussion | p. 266 |
| On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike) (Transcript of Discussion) | p. 276 |
| Safer Scripting Through Precompilation | p. 284 |
| Discussion | p. 289 |
| Implementing a Multi-hat PDA | p. 295 |
| Discussion | p. 308 |
| Anonymous Context Based Role Activation Mechanism | p. 315 |
| Discussion | p. 322 |
| Topology of Covert Conflict (Transcript of Discussion) | p. 329 |
| The Initial Costs and Maintenance Costs of Protocols | p. 333 |
| Discussion | p. 336 |
| Alice and Bob | p. 344 |
| Author Index | p. 347 |
| Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.