default search action
11. Security Protocols Workshop 2003: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers. Lecture Notes in Computer Science 3364, Springer 2005, ISBN 3-540-28389-7 - Bruce Christianson:
Where Have All the Protocols Gone? 1-2 - Giampaolo Bella, Stefano Bistarelli, Fabio Massacci:
A Protocol's Life After Attacks.... 3-10 - Giampaolo Bella:
A Protocol's Life After Attacks... (Discussion). 11-18 - Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Towards Flexible Credential Negotiation Protocols. 19-23 - Pierangela Samarati:
Towards Flexible Credential Negotiation Protocols (Discussion). 24-27 - N. Asokan, Valtteri Niemi, Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols. 28-41 - N. Asokan:
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). 42-48 - Simon N. Foley, Hongbin Zhou:
Towards a Framework for Autonomic Security Protocols. 49-54 - Simon N. Foley:
Towards a Framework for Autonomic Security Protocols (Discussion). 55-62 - Geraint Price:
Client v. Server Side Protocols, Interfaces and Storage. 63-73 - Geraint Price:
Client v. Server Side Protocols, Interfaces and Storage (Discussion). 74-79 - Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. 80-96 - Virgil D. Gligor:
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). 97-105 - Hassen Saïdi, Victoria Stavridou, Bruno Dutertre:
Protocol Codesign. 106-113 - Victoria Stavridou:
Protocol Codesign (Discussion). 114-118 - Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman:
Enforcing Security Policies for Distributed Objects Applications. 119-130 - Bogdan C. Popescu:
Enforcing Security Policies for Distributed Objects Applications (Discussion). 131-133 - Mads Dam:
Regular SPKI. 134-150 - Mads Dam:
Regular SPKI (Discussion). 151-152 - Birgit Pfitzmann, Michael Waidner:
Federated Identity-Management Protocols. 153-174 - Birgit Pfitzmann:
Federated Identity-Management Protocols (Discussion). 175-177 - Peter Y. A. Ryan:
Enforcing the Unenforceable. 178-182 - Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson:
Is the Verification Problem for Cryptographic Protocols Solved?. 183-189 - Bruce Christianson, Michael Roe, David Wheeler:
Secure Sessions from Weak Secrets. 190-205 - Bruce Christianson:
Secure Sessions from Weak Secrets (Discussion). 206-212 - Michael Roe:
Panel Session: Is Protocol Modelling Finished? 213-217 - Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
WAR: Wireless Anonymous Routing. 218-232 - Matt Blaze:
WAR: Wireless Anonymous Routing (Discussion). 233-240 - Jari Arkko, Pekka Nikander:
Limitations of IPsec Policy Mechanisms. 241-251 - Jari Arkko:
Limitations of IPsec Policy Mechanisms (Discussion). 252-254 - Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Deniable Authenticated Key Establishment for Internet Protocols. 255-271 - Wenbo Mao:
Deniable Authenticated Key Establishment for Internet Protocols (Discussion). 272-273 - Mike Burmester, Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. 274-282 - Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). 283-287 - Ross J. Anderson:
What We Can Learn from API Security. 288-300 - Kamil Kulesza, Zbigniew Kotulski:
Addressing New Challenges by Building Security Protocols Around Graphs. 301-306 - Brian Monahan:
From Security Protocols to Systems Security. 307-322 - Brian Monahan:
From Security Protocols to Systems Security (Discussion). 323-323 - Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli:
Biometrics to Enhance Smartcard Security. 324-332 - Fabio Martinelli:
Biometrics to Enhance Smartcard Security (Discussion). 333-335 - James A. Malcolm:
Blind Publication: A Copyright Library without Publication or Trust. 336-340 - James A. Malcolm:
Blind Publication: A Copyright Library Without Publication or Trust (Discussion). 341-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.