책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780792375586
· 쪽수 : 208쪽
목차
Preface. Acknowledgements. Part 1: Reviewed Papers. 1. A Role?Based Specification of the SET Payment Transaction Protocol; H. Sakurada, Y. Tsukada. 2. Information Security: Mutual Authentication in E-Commerce; S.H. Von Solms, M.V. Kisimov. 3. Software-Based Receipt-Freeness in On-Line Elections; E. Magkos, et al. 4. ID-Based Structured Multisignature Schemes; Chih-Yin Lin, et al. 5. Probabilistic Relations for the Solitaire Keystream Generator; M. Pudovkina. 6. Hazard Analysis for Security Protocol Requirements; N. Foster, J. Jacob. 7. Securing RMI Communication; V. Naessens, et al. 8. Secure Java Development with UML; J. Jurgens. 9. Security Through Aspect-Oriented Programming; B. de Win, et al. 10. Extending a Campus Network with Remote Bubbles using IPsec; A. Bonnet, M. Lobelle. 11. Combining World Wide Web and Wireless Security; J. Claessens, et al. 12. On Mobile Agent Based Transactions in Moderately Hostile Environments; N. Borselius, et al. 13. SPARTA, A Mobile Agent Based Intrusion Detection System; C. Kriigel, et al. Part 2: Invited Paper. 1. Trust Domain Infrastructure Security Certification; P. van Dijken. Author Index.