AMS eBook CollectionsOne of the world's most respected mathematical collections, available in digital format for your library or institution
Network Threats
About this Title
Rebecca N. Wright, AT&T Labs Research, Florham Park, NJ and Peter G. Neumann, SRI International, Menlo Park, CA, Editors
Publication: DIMACS Series in Discrete Mathematics and Theoretical Computer Science
Publication Year:
1998; Volume 38
ISBNs: 978-0-8218-0832-0 (print); 978-1-4704-3996-5 (online)
DOI: https://doi.org/10.1090/dimacs/038
MathSciNet review: MR1601047
MSC: Primary 94-06; Secondary 68-06, 94A60
Table of Contents
Front/Back Matter
Chapters
- A representation of protocol attacks for risk assessment
- Verifying privacy enhanced mail functions with higher order logic
- Cryptanalysis of RSA-type cryptosystems: A visit
- Information leakage in encrypted key exchange
- Observed weaknesses in security dynamics’ client/server protocol
- Web security: A high level view
- Flexible, extensible Java security using digital signature
- Trust and security: A new look at the Byzantine generals problem
- Channels: Avoiding unwanted electronic mail
- Demonstration of hacker techniques