Security Protocols

14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5087)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-2
  3. Matt Blaze
    Pages 3-12
  4. Peter Y. A. Ryan, Thea Peacock
    Pages 13-19
  5. Peter Y. A. Ryan
    Pages 20-25
  6. Srijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum
    Pages 26-31
  7. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven Murdoch, Ross Anderson et al.
    Pages 40-48
  8. Mike Bond
    Pages 49-51
  9. James Heather, Kun Wei
    Pages 52-58
  10. James Heather
    Pages 59-61
  11. Per Harald Myrvang, Tage Stabell-Kulø
    Pages 62-84
  12. Tage Stabell-Kulø
    Pages 85-96
  13. Alastair R. Beresford, Jonathan J. Davies, Robert K. Harle
    Pages 97-104
  14. Alastair R. Beresford
    Pages 105-111
  15. Dan Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis
    Pages 112-121
  16. Vashek Matyas
    Pages 122-127
  17. Vashek Matyas
    Pages 128-131
  18. Wenbo Mao, Andrew Martin, Hai Jin, Huanguo Zhang
    Pages 132-149

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006.

The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.

Keywords

API security RSA authentication bots congestion charging cyborgs grid security location information network security privacy public key security security metrics turing test voting protocols

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 1
  • Michael Roe
    • 3
  1. 1.Computer Science DepartmentUniversity of HertfordshireHatfieldUK
  2. 2.Faculty of Science, Department of Computer SystemsVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Microsoft Research Ltd.CambridgeUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04904-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04903-3
  • Online ISBN 978-3-642-04904-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book