Skip to main content

Keynote Address: Security Protocols and the Swiss Army Knife

Transcript of Discussion

  • Conference paper
  • First Online:
  • 331 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2133))

Abstract

Keynote address is an unnecessarily grand term for what I’m about to do, and I don’t particularly guarantee to go on for long — leaving more time for more interesting things. The original theme that was stated for this workshop was broadening the horizons for security protocols and (as is traditional) nobody has said anything about that topic whatever in their papers, so I thought I would see if I could say something about it now so that the theme is not totally overlooked.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Needham, R. (2001). Keynote Address: Security Protocols and the Swiss Army Knife. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-44810-1_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42566-3

  • Online ISBN: 978-3-540-44810-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics