Advertisement

Security Protocols

14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5087)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-2
  3. Matt Blaze
    Pages 3-12
  4. Peter Y. A. Ryan, Thea Peacock
    Pages 13-19
  5. Peter Y. A. Ryan
    Pages 20-25
  6. Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum
    Pages 26-31
  7. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven Murdoch, Ross Anderson et al.
    Pages 40-48
  8. Mike Bond
    Pages 49-51
  9. James Heather, Kun Wei
    Pages 52-58
  10. James Heather
    Pages 59-61
  11. Per Harald Myrvang, Tage Stabell-Kulø
    Pages 62-84
  12. Tage Stabell-Kulø
    Pages 85-96
  13. Alastair R. Beresford, Jonathan J. Davies, Robert K. Harle
    Pages 97-104
  14. Alastair R. Beresford
    Pages 105-111
  15. Dan Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis
    Pages 112-121
  16. Vashek Matyas
    Pages 122-127
  17. Vashek Matyas
    Pages 128-131
  18. Wenbo Mao, Andrew Martin, Hai Jin, Huanguo Zhang
    Pages 132-149
  19. Ross Anderson, Mike Bond
    Pages 153-156
  20. Ross Anderson
    Pages 157-163
  21. Craig Gentry, Zulfikar Ramzan, Stuart Stubblebine
    Pages 177-180
  22. Craig Gentry
    Pages 181-189
  23. Jeff Yan
    Pages 190-197
  24. Jeff Yan
    Pages 198-201
  25. Feng Hao, Piotr Zieliński
    Pages 202-211
  26. Feng Hao
    Pages 212-214
  27. Lawrence O’Gorman, Lynne Brotman, Michael Sammon
    Pages 215-229
  28. Hoon Wei Lim, Kenneth G. Paterson
    Pages 237-256
  29. Hoon Wei Lim
    Pages 257-260
  30. Bruce Christianson, Alex Shafarenko
    Pages 261-265
  31. Alex Shafarenko
    Pages 266-275
  32. Matthew Johnson, Frank Stajano
    Pages 276-283
  33. Eve
    Pages 286-286
  34. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.

The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.

Keywords

API security RSA authentication bots congestion charging cyborgs grid security location information network security privacy public key security security metrics turing test voting protocols

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 1
  • Michael Roe
    • 3
  1. 1.Computer Science DepartmentUniversity of HertfordshireHatfieldUK
  2. 2.Faculty of Science, Department of Computer SystemsVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Microsoft Research Ltd.CambridgeUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04904-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04903-3
  • Online ISBN 978-3-642-04904-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site