Security Protocols

7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 1999

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1796)

Table of contents

  1. Front Matter
  2. Stewart Lee
    Pages 6-14
  3. Mark Lomas
    Pages 15-20
  4. Ross Anderson, Jong-Hyeon Lee
    Pages 21-36
  5. Babak Sadighi Firozabadi, Marek Sergot
    Pages 48-53
  6. Babak Sadighi Firozabadi
    Pages 54-59
  7. Bruce Christianson
    Pages 60-64
  8. Dieter Gollmann
    Pages 65-72
  9. Lawrence C. Paulson
    Pages 73-77
  10. Lawrence C. Paulson
    Pages 78-84
  11. Giampaolo Bella
    Pages 85-90
  12. Giampaulo Bella
    Pages 91-94
  13. Matt Blaze, John Ioannidis, Angelos D. Keromytis
    Pages 103-108
  14. Francesco Bergadano, Davide Cavagnino, Bruno Crispo
    Pages 119-131
  15. Francesco Bergadano
    Pages 132-139
  16. Michael Roe
    Pages 140-146
  17. Michael Roe
    Pages 147-152
  18. Virgil D. Gligor, Pompiliu Donescu
    Pages 153-168
  19. Virgil Gligor
    Pages 169-171
  20. Frank Stajano
    Pages 183-194
  21. Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryoichi Sasaki et al.
    Pages 195-202
  22. Ryoichi Sasaki
    Pages 203-207
  23. Bruce Christianson, James A. Malcolm, Brian Robinson
    Pages 208-211
  24. James A. Malcolm
    Pages 212-218
  25. Bob Morris
    Pages 219-223
  26. Back Matter

About these proceedings


Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.


Bridge Information security authentication internet security networks performance privacy secure networks security security protocols systems security trust management

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 3
  • Michael Roe
    • 4
  1. 1.Computer Science DepartmentUniversity of Hertfordshire 
  2. 2.Computer Systems GroupVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Georgia Institute of TechnologyAtlanta
  4. 4.Microsoft ResearchCambridgeUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-67381-1
  • Online ISBN 978-3-540-45570-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences