Security Protocols

8th International Workshop Cambridge, UK, April 3–5, 2000 Revised Papers

  • Bruce Christianson
  • James A. Malcolm
  • Bruno Crispo
  • Michael Roe
Conference proceedings Security Protocols 2000

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2133)

Table of contents

  1. Front Matter
    Pages I-VIII
  2. Dieter Gollmann
    Pages 5-13
  3. Dieter Gollman
    Pages 14-19
  4. Michael Roe
    Pages 20-23
  5. Pekka Nikander, Kristiina Karvonen
    Pages 24-35
  6. Pekka Nikander
    Pages 36-42
  7. Peter Landrock
    Pages 43-48
  8. Peter Ryan
    Pages 49-53
  9. Michael Roe, Ross Anderson, Bill Harbison, Mark Lomas
    Pages 62-73
  10. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Pages 74-81
  11. Giampaolo Bella
    Pages 87-93
  12. Giampaolo Bella
    Pages 94-99
  13. Himanshu Khurana, Virgil D. Gligor
    Pages 100-112
  14. Ross Anderson
    Pages 125-127
  15. Ross Anderson
    Pages 128-141
  16. Tuomas Aura, Pekka Nikander, Jussipekka Leiwo
    Pages 170-177
  17. Bruce Christianson, Bruno Crispo, James A. Malcolm
    Pages 182-183
  18. Virgil Gligor, Matt Blaze, John Ioannidis
    Pages 194-203
  19. Frank Stajano
    Pages 204-214
  20. Frank Stajano
    Pages 215-222
  21. Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita et al.
    Pages 238-248
  22. Mark Lomas
    Pages 253-255
  23. Pages 256-256
  24. Back Matter
    Pages 257-257

About these proceedings


The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don’t insist they relate to the current theme in an obvious way. In our experience, the emergence of the theme as a unifying threadtakesplaceduringthediscussionsattheworkshopitself.Theonlyground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a ?nished piece of work. Whentheparticipantsmeet,wetrytofocusthediscussionsupontheconc- tual issues which emerge. Security protocols link naturally to many other areas of Computer Science, and deep water can be reached very quickly. Afterwards, we invite participants to re-draft their position papers in a way which exposes the emergent issues but leaves open the way to their further development. We also prepare written transcripts of the recorded discussions. These are edited (in some cases very heavily) to illustrate the way in which the di?erent arguments and perspectives have interacted. We publish these proceedings as an invitation to the research community. Although many interesting results ?rst see the light of day in a volume of our proceedings, laying claim to these is not our primary purpose of publication. Rather, we bring our discussions and insights to a wider audience in order to suggest new lines of investigation which the community may fruitfully pursue.


Anonymity Authentication Cryptographic Protocols Data Security Denial of Service Information Security Internet Security Network Security Privacy Secure Communications Secure Networking Security Protocols Systems Security bridge

Editors and affiliations

  • Bruce Christianson
    • 1
  • James A. Malcolm
    • 1
  • Bruno Crispo
    • 2
  • Michael Roe
    • 3
  1. 1.Computer Science DepartmentUniversity of HertfordshireHatfieldUK
  2. 2.CryptomathicTorinoItaly
  3. 3.Microsoft Research Ltd.CambridgeUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2001
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-42566-3
  • Online ISBN 978-3-540-44810-5
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site