Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.

Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly,...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Christianson, Bruce (Editor), Crispo, Bruno (Editor), Malcolm, James A. (Editor), Roe, Michael (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
Edition:1st ed. 2000.
Series:Lecture Notes in Computer Science, 1796
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • Keynote Address: The Changing Environment
  • Composing Security Properties
  • Auditing against Multiple Policies
  • Jikzi: A New Framework for Secure Publishing
  • Jikzi: A New Framework for Secure Publishing
  • Power and Permission in Security Systems
  • Power and Permission in Computer Systems
  • Auditing against Impossible Abstractions
  • What is Authentication?
  • Relations Between Secrets: The Yahalom Protocol
  • The Yahalom Protocol
  • Modelling Agents’ Knowledge Inductively
  • Modelling Agents’ Knowledge Inductively
  • Time-Lock Puzzle with Examinable Evidence of Unlocking Time
  • Time-Lock Puzzle with Examinable Evidence of Unlocking Time
  • Trust Management and Network Layer Security Protocols
  • Trust Management and Network Layer Security Protocols
  • Issues in Multicast Security
  • Issues in Multicast Security
  • Performance of Protocols
  • Performance of Protocols
  • Integrity-Aware PCBC Encryption Schemes
  • Integrity-Aware PCBC Encryption Schemes
  • The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
  • The Resurrecting Duckling
  • INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds
  • INTERNET-MARKs
  • Pictures Can’t Lie under Oath
  • Pictures Can’t Lie under Oath
  • Bob versus Bob – Good Guy/Bad Guy.