Security Protocols XXVI

26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers

  • Vashek Matyáš
  • Petr Švenda
  • Frank Stajano
  • Bruce Christianson
  • Jonathan Anderson
Conference proceedings Security Protocols 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11286)

Also part of the Security and Cryptology book sub series (LNSC, volume 11286)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Graham Rymer, David Llewellyn-Jones
    Pages 1-14
  3. Wanpeng Li, Chris J. Mitchell, Thomas Chen
    Pages 24-41
  4. Fabio Massacci, Chan Nam Ngo, Daniele Venturi, Julian Williams
    Pages 45-54
  5. José Becerra, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala
    Pages 63-77
  6. Peter Y. A. Ryan
    Pages 78-83
  7. Lukas Nemec, Radim Ostadal, Vashek Matyas, Petr Svenda
    Pages 84-92
  8. Taciane Martimiano, Jean Everson Martina
    Pages 96-105
  9. Jean Everson Martina
    Pages 106-113
  10. Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano
    Pages 114-125
  11. Sarah Azouvi, Alexander Hicks, Steven J. Murdoch
    Pages 132-141
  12. Tudor Dumitraş, Yiğitcan Kaya, Radu Mărginean, Octavian Suciu
    Pages 150-162
  13. Martin Kleppmann, Stephan A. Kollmann, Diana A. Vasile, Alastair R. Beresford
    Pages 179-185
  14. Virgil Gligor, Maverick Woo
    Pages 192-202
  15. Frank Stajano, Mark Lomas
    Pages 209-213
  16. Patrick McCorry, Malte Möser, Syed Taha Ali
    Pages 225-233
  17. Ross Anderson, Ilia Shumailov, Mansoor Ahmed
    Pages 243-253
  18. Back Matter
    Pages 305-305

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in March 2018.

The volume consists of 17 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was fail-safe and fail-deadly concepts in protocol design. The topics covered included failures and attacks; novel protocols; threat models and incentives; cryptomoney; and the interplay of cryptography and dissent.


artificial intelligence authentication computer science cryptography data security internet security protocols software engineering wireless networks wireless sensor networks wireless telecommunication systems

Editors and affiliations

  • Vashek Matyáš
    • 1
  • Petr Švenda
    • 2
  • Frank Stajano
    • 3
  • Bruce Christianson
    • 4
  • Jonathan Anderson
    • 5
  1. 1.Masaryk UniversityBrnoCzech Republic
  2. 2.Masaryk UniversityBrnoCzech Republic
  3. 3.University of CambridgeCambridgeUK
  4. 4.University of HertfordshireHatfieldUK
  5. 5.Memorial University of NewfoundlandSt. John'sCanada

Bibliographic information