Book Volume 2133 2001

Security Protocols

8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers

ISBN: 978-3-540-42566-3 (Print) 978-3-540-44810-5 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages I-VIII

  2. Chapter

    Pages 1-4

    Keynote Address: Security Protocols and the Swiss Army Knife

  3. Chapter

    Pages 5-13

    Mergers and Principals

  4. Chapter

    Pages 14-19

    Mergers and Principals

  5. Chapter

    Pages 20-23

    Authentication and Naming

  6. Chapter

    Pages 24-35

    Users and Trust in Cyberspace

  7. Chapter

    Pages 36-42

    Users and Trust in Cyberspace

  8. Chapter

    Pages 43-48

    Interactive Identification Protocols

  9. Chapter

    Pages 49-53

    Open Questions

  10. Chapter

    Pages 54-61

    Looking on the Bright Side of Black-Box Cryptography

  11. Chapter

    Pages 62-73

    Government Access to Keys - Panel Discussion

  12. Chapter

    Pages 74-81

    Making Sense of Specifications: The Formalization of SET

  13. Chapter

    Pages 82-86

    Making Sense of Specifications: The Formalization of SET

  14. Chapter

    Pages 87-93

    Lack of Explicitness Strikes Back

  15. Chapter

    Pages 94-99

    Lack of Explicitness Strikes Back

  16. Chapter

    Pages 100-112

    Review and Revocation of Access Privileges Distributed with PKI Certificates

  17. Chapter

    Pages 113-124

    Review and Revocation of Access Privileges Distributed with PKI Certificates

  18. Chapter

    Pages 125-127

    The Correctness of Crypto Transaction Sets

  19. Chapter

    Pages 128-141

    The Correctness of Crypto Transaction Sets

  20. Chapter

    Pages 142-154

    Micro-management of Risk in a Trust-Based Billing System

  21. Chapter

    Pages 155-164

    Broadening the Scope of Fault Tolerance within Secure Services

previous Page of 2