Advertisement

Security Protocols

15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5964)

Table of contents

  1. Front Matter
  2. Micah Sherr, Eric Cronin, Matt Blaze
    Pages 3-12
  3. Amerson Lin, Mike Bond, Jolyon Clulow
    Pages 20-33
  4. Marcus C. Granado
    Pages 37-57
  5. Shishir Nagaraja
    Pages 58-73
  6. Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zieliński
    Pages 81-97
  7. Alf Zugenmaier, Julien Laganier, Anand Prasad, Kristian Slavov
    Pages 104-109
  8. Thomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan
    Pages 114-130
  9. Bruce Christianson, Jun Li
    Pages 133-138
  10. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross Anderson, Ronald L. Rivest
    Pages 147-149
  11. Jaap-Henk Hoepman
    Pages 152-165
  12. Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin et al.
    Pages 171-171
  13. Jolyon Clulow
    Pages 172-177
  14. Haruno Kataoka, Akira Utsumi, Yuki Hirose, Hiroshi Yoshiura
    Pages 178-188
  15. Alec Yasinsac, J. Todd McDonald
    Pages 191-200
  16. Alec Yasinsac
    Pages 201-203
  17. Wenbo Mao, Fei Yan, Chuanjiang Yi, Haibo Chen
    Pages 204-221
  18. George Danezis, Ben Laurie
    Pages 222-243
  19. Bruce Christianson, Bruno Crispo, James Malcolm, Michael Roe
    Pages 256-256
  20. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.

Keywords

grid computing hash functions information leakage isotropic channels measurable security privacy public keys secure sessions security protocols signatures social networks theorem proving voting systems

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 1
  • Michael Roe
    • 3
  1. 1.Computer Science DepartmentUniversity of HertfordshireHatfieldUK
  2. 2.University of TrentoTrentoItaly
  3. 3.Microsoft Research Ltd.,CambridgeUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17773-6
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17772-9
  • Online ISBN 978-3-642-17773-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site