Security Protocols

7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 1999

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1796)

Table of contents

  1. Front Matter
  2. Stewart Lee
    Pages 6-14
  3. Mark Lomas
    Pages 15-20
  4. Ross Anderson, Jong-Hyeon Lee
    Pages 21-36
  5. Babak Sadighi Firozabadi, Marek Sergot
    Pages 48-53
  6. Babak Sadighi Firozabadi
    Pages 54-59
  7. Bruce Christianson
    Pages 60-64
  8. Dieter Gollmann
    Pages 65-72
  9. Lawrence C. Paulson
    Pages 73-77
  10. Lawrence C. Paulson
    Pages 78-84
  11. Giampaolo Bella
    Pages 85-90
  12. Giampaulo Bella
    Pages 91-94
  13. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Pages 103-108
  14. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Pages 119-131
  15. Francesco Bergadano
    Pages 132-139

About these proceedings

Introduction

Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.

Keywords

Bridge Information security authentication internet security networks performance privacy secure networks security security protocols systems security trust management

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 3
  • Michael Roe
    • 4
  1. 1.Computer Science DepartmentUniversity of Hertfordshire 
  2. 2.Computer Systems GroupVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Georgia Institute of TechnologyAtlanta
  4. 4.Microsoft ResearchCambridgeUK

Bibliographic information

  • DOI https://doi.org/10.1007/10720107
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-67381-1
  • Online ISBN 978-3-540-45570-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book