Security Protocols

Security Protocols

4.11 - 1251 ratings - Source

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.2.1 Payment A vehicle owner who wishes to make use of the public roads must pay a fee. ... By using a blind signature scheme the vehicle owner can receive a digital certificate (containing details of the road segment, time of travel and vehicleanbsp;...

Title:Security Protocols
Author:Bruce Christianson, Bruno Crispo, James A. Malcolm
Publisher:Springer Science & Business Media - 2009-10-15


You Must CONTINUE and create a free account to access unlimited downloads & streaming