Keynote Address: Security Protocols and the Swiss Army Knife

Transcript of Discussion
  • Roger Needham
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2133)


Keynote address is an unnecessarily grand term for what I’m about to do, and I don’t particularly guarantee to go on for long — leaving more time for more interesting things. The original theme that was stated for this workshop was broadening the horizons for security protocols and (as is traditional) nobody has said anything about that topic whatever in their papers, so I thought I would see if I could say something about it now so that the theme is not totally overlooked.


Communication Protocol Authentication Protocol Security Protocol Replay Attack Keynote Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Roger Needham
    • 1
  1. 1.Microsoft ResearchUSA

Personalised recommendations