Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

  • Frank Stajano
  • Jonathan Anderson
  • Bruce Christianson
  • Vashek Matyáš
Conference proceedings Security Protocols 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10476)

Also part of the Security and Cryptology book sub series (LNSC, volume 10476)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Joan Feigenbaum, Bryan Ford
    Pages 1-8
  3. Virgil Gligor, Frank Stajano
    Pages 38-48
  4. Paul Wernick, Bruce Christianson, Joseph Spring
    Pages 60-68
  5. Partha Das Chowdhury, Bruce Christianson
    Pages 76-84
  6. Mark D. Ryan
    Pages 93-98
  7. Thanh Bui, Tuomas Aura
    Pages 123-136
  8. Ross Anderson, Khaled Baqer
    Pages 144-156
  9. Fabio Massacci, Chan Nam Ngo, Jing Nie, Daniele Venturi, Julian Williams
    Pages 171-179
  10. Hugo Jonker, Sjouke Mauw
    Pages 186-200
  11. Jonathan Weekes, Shishir Nagaraja
    Pages 214-223
  12. Marcus Völp, Francisco Rocha, Jeremie Decouchant, Jiangshan Yu, Paulo Esteves-Verissimo
    Pages 232-237
  13. Sergiu Costea, Marios O. Choudary, Costin Raiciu
    Pages 247-253
  14. Dylan Clarke, Syed Taha Ali
    Pages 260-267
  15. A. W. Roscoe, Peter Y. A. Ryan
    Pages 278-297
  16. Back Matter
    Pages 307-307

About these proceedings


This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.

The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions.  The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security.


security and privacy formal methods theory of security systems security network security software and application security security protocols web protocol security mobile and wireless security authentication cryptography computer crime internet encryption public key cryptography

Editors and affiliations

  • Frank Stajano
    • 1
  • Jonathan Anderson
    • 2
  • Bruce Christianson
    • 3
  • Vashek Matyáš
    • 4
  1. 1.University of CambridgeCambridgeUnited Kingdom
  2. 2.Memorial University of NewfoundlandSt. John’sCanada
  3. 3.University of HertfordshireHatfieldUnited Kingdom
  4. 4.Masaryk UniversityBrnoCzech Republic

Bibliographic information