Security Protocols XVII

17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers

ISBN: 978-3-642-36212-5 (Print) 978-3-642-36213-2 (Online)

Table of contents (39 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-2

    Introduction: Brief Encounters

  3. No Access

    Book Chapter

    Pages 3-17

    Evolutionary Design of Attack Strategies

  4. No Access

    Book Chapter

    Pages 18-23

    Evolutionary Design of Attack Strategies

  5. No Access

    Book Chapter

    Pages 24-27

    Below the Salt

  6. No Access

    Book Chapter

    Pages 28-33

    Is the Honeymoon over?

  7. No Access

    Book Chapter

    Pages 34-40

    Below the Salt

  8. No Access

    Book Chapter

    Pages 41-47

    Attacking Each Other

  9. No Access

    Book Chapter

    Pages 48-50

    Attacking Each Other

  10. No Access

    Book Chapter

    Pages 51-62

    Bringing Zero-Knowledge Proofs of Knowledge to Practice

  11. No Access

    Book Chapter

    Pages 63-68

    Bringing Zero-Knowledge Proofs of Knowledge to Practice

  12. No Access

    Book Chapter

    Pages 69-81

    Towards a Verified Reference Implementation of a Trusted Platform Module

  13. No Access

    Book Chapter

    Pages 82-86

    Towards a Verified Reference Implementation of a Trusted Platform Module

  14. No Access

    Book Chapter

    Pages 87-92

    The Least Privacy-Damaging Centralised Traffic Data Retention Architecture

  15. No Access

    Book Chapter

    Pages 93-110

    The Least Privacy-Damaging Centralised Traffic Data Retention Architecture

  16. No Access

    Book Chapter

    Pages 111-130

    Pretty Good Democracy

  17. No Access

    Book Chapter

    Pages 131-142

    Pretty Good Democracy

  18. No Access

    Book Chapter

    Pages 143-148

    Design and Verification of Anonymous Trust Protocols

  19. No Access

    Book Chapter

    Pages 149-156

    Design and Verification of Anonymous Trust Protocols

  20. No Access

    Book Chapter

    Pages 157-161

    Brief Encounters with a Random Key Graph

  21. No Access

    Book Chapter

    Pages 162-170

    Brief Encounters with a Random Key Graph

previous Page of 2