Security Protocols

8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers

ISBN: 978-3-540-42566-3 (Print) 978-3-540-44810-5 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-4

    Keynote Address: Security Protocols and the Swiss Army Knife

  2. No Access

    Book Chapter

    Pages 5-13

    Mergers and Principals

  3. No Access

    Book Chapter

    Pages 14-19

    Mergers and Principals

  4. No Access

    Book Chapter

    Pages 20-23

    Authentication and Naming

  5. No Access

    Book Chapter

    Pages 24-35

    Users and Trust in Cyberspace

  6. No Access

    Book Chapter

    Pages 36-42

    Users and Trust in Cyberspace

  7. No Access

    Book Chapter

    Pages 43-48

    Interactive Identification Protocols

  8. No Access

    Book Chapter

    Pages 49-53

    Open Questions

  9. No Access

    Book Chapter

    Pages 54-61

    Looking on the Bright Side of Black-Box Cryptography

  10. No Access

    Book Chapter

    Pages 62-73

    Government Access to Keys - Panel Discussion

  11. No Access

    Book Chapter

    Pages 74-81

    Making Sense of Specifications: The Formalization of SET

  12. No Access

    Book Chapter

    Pages 82-86

    Making Sense of Specifications: The Formalization of SET

  13. No Access

    Book Chapter

    Pages 87-93

    Lack of Explicitness Strikes Back

  14. No Access

    Book Chapter

    Pages 94-99

    Lack of Explicitness Strikes Back

  15. No Access

    Book Chapter

    Pages 100-112

    Review and Revocation of Access Privileges Distributed with PKI Certificates

  16. No Access

    Book Chapter

    Pages 113-124

    Review and Revocation of Access Privileges Distributed with PKI Certificates

  17. No Access

    Book Chapter

    Pages 125-127

    The Correctness of Crypto Transaction Sets

  18. No Access

    Book Chapter

    Pages 128-141

    The Correctness of Crypto Transaction Sets

  19. No Access

    Book Chapter

    Pages 142-154

    Micro-management of Risk in a Trust-Based Billing System

  20. No Access

    Book Chapter

    Pages 155-164

    Broadening the Scope of Fault Tolerance within Secure Services

previous Page of 2